Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


WILLIAM L. ANTHONY (State Bar No. 106908) 
ERIC L. WESENBERG (State Bar No. 139696) 
HEIDI L. KEEFE, State Bar No. 178960 
MARK R. WEINSTEIN (State Bar No. 193043) 
ORRICK, HERRINGTON & SUTCLIFFE, LLP 
1000 Marsh Road 
Menlo Park, CA 94025 
Telephone: (650) 614-7400 
Facsimile: (650) 614-7401 

STEVEN ALEXANDER (admitted Pro Hac Vice) 

KRISTIN L. CLEVELAND (admitted Pro Hac Vice) 

JAMES E. GERINGER (admitted Pro Hac Vice) 

JOHN D. VANDENBERG 

KLARQUIST SPARKMAN, LLP 

One World Trade Center, Suite 1600 

121 S.W. Salmon Street 

Portland, OR 97204 

Telephone: (503) 226-7391 

Facsimile: (503) 228-9446 

Attorneys for Defendant and Counterclaimant, 
MICROSOFT CORPORATION 


UNITED STATES DISTRICT COURT 
NORTHERN DISTRICT OF CALIFORNIA 
OAKLAND DIVISION 


INTERTRUST TECHNOLOGIES 
CORPORATION, a Delaware corporation, 

Plaintiff, 

v. 

MICROSOFT CORPORATION, a 
Washington corporation, 

Defendant. 


MICROSOFT CORPORATION, a 
Washington corporation, 

Counterclaimant, 


v. 


INTERTRUST TECHNOLOGIES 
CORPORATION, a Delaware corporation, 


Case No. C01-1640SBA 
Consolidated with C02-0647 SBA 

MICROSOFT'S PRELIMINARY 
INVALIDITY CONTENTIONS 
REGARDING U.S. PATENTS 6,253,193 
& 6,185,683 PURSUANT TO PLR 3-3, 
3-4 


The Honorable Saundra B. Armstrong 


Counterclaim-Defendant. 


InterTrust and its agents have engaged in a long pattern of misconduct that extends to and 
includes false and unsupported allegations of patent infringement. By way of example, the 
following information and attached charts illustrate that InterTrust has made invalid assertions of 
patent claim infringement under 35 U.S.C. §§ 102, 103 and 112 (limited to indefiniteness, non- 
enablement, and written description). Additional grounds for invalidity and unenforceability lie 
outside the scope of PLR 3-3 and are expressly reserved. Microsoft further reserves the 
unrestricted right to assert its defenses (and seek declaratory judgments) that the claims asserted 
by InterTrust are not infringed. 

Microsoft has stated and preserves its objections and arguments as set forth in its motions 
on file and case management statements. Microsoft further notes and incorporates by reference 
its objections to InterTrust's improper attempts to modify its PLR 3-1 Statements without consent 
or leave of Court. Without limitation, Microsoft objects to InterTrust's refusal to provide a 
complete PLR 3-1 Statement for any of the InterTrust asserted patents, or to provide relevant 
information sought in discovery, including the identity of the alleged inventors of specific claims; 
conception or actual reduction to practice dates for specific claims; whether to its knowledge 
there has ever been any alleged embodiment(s) of asserted claims; and what if any specification 
support is alleged, including from any of the applications from which InterTrust claims priority. 
For example, InterTrust has failed to provide discovery regarding reduction to practice, including 
as set forth in Microsoft's motion to compel and the Court's rulings thereon. For another 
example, InterTrust has alleged that specific claims are entitled to rely on one or more earlier 
applications for priority, but has refused to state how. Microsoft expressly reserves the right to 
rely upon InterTrust's own activities, alone and in connection with others, as prior art, should 
InterTrust fully comply with relevant discovery. Microsoft further reserves the right to 
supplement this statement or otherwise further respond if InterTrust modifies its PLR 3-1 
allegations (including but not limited to providing proper initial PLR 3-1 Statements), whether 
through motion or consent, or if InterTrust contends (or the Court rules) that any earlier or later 
priority date(s) may apply. 
PLR 3-3(a, b) 

This Statement responds to InterTrust's initial PLR 3-1 Statement regarding U.S. Patents 
6,253,193 and 6,185,683 served on or about October 29, 2001. The identities of prior art 
references that anticipate claims as asserted in InterTrust's PLR 3-1 Statement or render them 

PAGE 2 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



obvious are set forth below and in the attached PLR 3-3(c) charts. Please refer to the columns in 
the charts for further description of the references identified in abbreviated form below. 


Asserted Claims 

References That Anticipate 
and/or Render Obvious 

'683 - 2, 28-29 

Stefik, CUPID, CNI/IMA 94, Choudhury/Maxemchuk, 
Tygar/Yee, Neuman, Davies & Price, ATMs, Chaum, 
Telescript, NT, Bell-Lapadula, CUPID, Blaze, "secure" 
OODBs,Kerberos, Cox/Mori, Griswold, Cryptolopes, 
iOpener, iPower, Lampson 

'193-1.4,11,15,19 

Stefik, Choudhury/Maxemchuk, Blaze, CNI/IMA 94, 
Hellman, CUPID, Chaum, Neuman 


See also the cited art in the manner applied by the Examiners. 

Each prior art reference identified herein and in the attached charts anticipates one or 
more asserted claims or renders them obvious. People having knowledge of this information prior 
to relevant priority dates include the authors/creators and recipients/users of each reference. 

Entities making/receiving offers or information regarding products referenced herein 
include the following: 


Item 

Date 

exemplary entities making offer 
and/or information known 

NT, OLE, COM 

1993 and continuing thru at 
least 2/12/95 and 2/24/97 

Microsoft Corp. 

Kerberos 

before 1994 and continuing 
thru at least 2/12/95 and 
2/24/97 

MIT; B. Clifford Neuman 

Strongbox, Dyad, 
Mach 

before 1994 and continuing 
thru at least 1995 

Carnegie Mellon Univ.; Doug 
Tygar; Bennet Yee, Rick Rashid 

Stefik 

at least by 1994 and continuing 
thru at least 2/12/95 and 
2/24/97 

Xerox; ContentGuard 

CUPID 

at least by 2/94 and continuing 
thru at least 2/12/95 and 
2/24/97 

See '683 chart 

PolicyMaker 

by 1996 

AT&T 

PersonaLink 

at least prior to 2/12/95 

AT&T 

Telescript 

at least by 1994 

General Magic, AT&T, RSA 

PGP 

at least by 2/94 and continuing 

Phil Zimmerman 


1 

PAGE 3 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




thru at least 2/12/95 and 
2/24/97 


RSA software 

at least before 2/12/95 and 
2/24/97 

RSA 

iPower, iOpener 

before 2/12/95 

National Semiconductor 

"secure" OODB 
systems (e.g., Orion, 
Itasca, Thor) 

at least by 2/13/94 and 
continuing thru at least 2/12/95 
and 2/24/97 

MCC, Itasca, MIT (see '683 
chart); IBEX 

Cryptolope & 
InfoMarket 

Before 2/12/95 and 2/24/97 

IBM 


From InterTrust's current document production, it appears that its employees' and 
consultants' activities, including offers for sale, public uses, derivations, and "inventions" (in the 
sense of Section 102(g)), and disclosures to Willis Ware, Drew Dean, and others not under any 
duty of confidentiality, constituted or created material and perhaps anticipatory prior art to many 
of the asserted claims, that was not cited to the Patent Office. Microsoft reserves the right to 
supplement this disclosure after Microsoft has had an opportunity to investigate this possible prior 
art in discovery. 

Suggestions to combine & motivations to combine 

Among the combinations obvious under § 103 are those set forth in each § 102 prior art 
reference cited herein, including D. Kahn, The Codebreakers (Macmillan 1967); L.D. Smith, 
Cryptography - the science of secret writing (Dover 1943, 1971); Bruce J. Walker and Ian F. 
Blake, Computer Security and Protection Structures (Dowden Hutchinson & Ross, Inc. 1977); D. 
Hsiao et al., Computer Security (Academic Press 1979); A. Konheim, Cryptography: A Primer 
(Wiley 1981); D. Denning, Cryptography and Data Security (Addison- Wesley 1982); Meyer, 
C.H., and Matyas, S.M., Cryptography - A New Dimension in Computer Data Security (Wiley 
1982); Wood, Unix System Security (Hayden 1985); Elliott Irving Organick, The Multics System 
(MIT 5th ed. 1985); CJ. Date, An Introduction to Database Systems. 4 th ed. (Addison- Wesley 
1986); J. Cooper, Computers & Communications (McGraw Hill 1989); S. Muftic, Security 
Mechanisms for Computer Networks (Ellis Horwood 1989); Davies & Price, Security For 
Computer Networks (Wiley 1989); W. LaLonde and J. Pugh, Inside Smalltalk (Prentice Hall 
1990); Computer Security (Time Life 1990); D. Russell et al., Computer Security Basics 
(O'Reilly 1991); S. Garfinkel, Practical Unix Security (O'Reilly 1991); CMU Computer Science: 
A 25 th Anniversary Commemorative. R. Rashid, ed. (ACM Press 1991); D. Curry, Unix System 

PAGE 4 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


Security (Addison- Wesley 1992); Custer, Inside NT (Microsoft Press 1993); B. Schneier, Applied 
Cryptography (Wiley 1994) (also 2d ed. 1996); D. Dougherty, The Mosaic Handbook (O'Reilly 
1994); Castano, Database Security (Addison- Wesley 1994); F. Cohen, Protection and Security on 
the Information Highway (Wiley 1995); A. Tanenbaum, Operating Systems, Design and 
Implementation (Prentice Hall 1987), Computer Networks . 2d ed. (Prentice Hall 1988), Modern 
Operating Systems (Prentice Hall 1992), and Distributed Operating Systems (Prentice Hall 1995); 
the work of Martin S. Olivier et al. cited in the attached '683 chart; the work of Morris Sloman, 
Jonathan Moffet, David Chaum, B. Clifford Neuman and Butler Lampson (see 
www.doc.ic.ac.uk/'-mss/MSSPubs.html; www-users.cs .york.ac.uk/~jdm/jdmpubs.htm ; 
www.chaum.com/articles/list_of_articles.htm; http://www.isi.edu/people/bcn/publications.html; 
and research.microsoft.com/lampson/Publications.html); any single conference, meeting or 
proceedings, such as the January 1994 RSA Data Security Conference, 2 the April 1993 
conference at Harvard University described in the deposition of Richard J. Linn, or Proceedings, 
Technological Strategies for Protecting Intellectual Property in the Networked Multimedia 
Environment. Journal of the Interactive Multimedia Association Intellectual Property Project , vol. 
1 no. 1 (Jan. 1994) ("CNI/IMA 94"). Additional obvious combinations include the combinations 
indicated in the asserted patents' file histories, related RFCs, work on a common project or 
product, and the combinations of any given author or named inventor's cumulative prior art work. 
For example, by "Stefik" this document refers to the referenced patents, acts and publications 
attributed in whole or part to Mark Stefik, taken individually or together. These make obvious, 
for example, that using methods in additive, iterative or other combinations could enhance overall 
"security," as would variation in individual steps or methods, such as encrypting, signing, or 
building files, using objects, and/or distributing in such a manner as to help do or protect things of 
value against unauthorized access, threats, or adverse effects. Adding or subtracting rights, or 
adding or repeating steps or functions (such as adding Kerberos to access control lists or 
capabilities, or watermarking binaries before and/or after encrypting any part of them), were 
simple variations of this. (See, e.g., Davies, Denning, Hellman, Neuman, Chaum, Linn, Blaze, 
Lampson, Tygar/Y ee, Stefik, Choudhury/Maxemchuk, Moffett, Curry, Garfinkel/Spafford, 
Muftic, Carroll, Hsiao et al.). These further make obvious that one can automate any manual step 


2 See, e.g., Walker, Notes from RSA Data Security Conference, 
www.eff.org/Privacv/Crvpto/Crypto misc/rsa conf.summarv (Jan. 18, 1994); 
www.ddi.com/documents/s- 1 005/ddi 9454dZ9454d.htm . (Dr. Dobbs Journal). 


PAGE 5 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


in the exchange of encrypted information, or vice versa. For example, one or more steps of a 
communication or transfer could be "out of band". 

The motivation for seeking "security," privacy, and integrity was widely recognized in the 
United States and elsewhere prior to February 13, 1994, and extends to any information or item of 
perceived value, including books, music, computer systems, and computer programs, as set forth 
in, e.g., Hellman, Stefik, Chaum, Choudhury, Date, Castano, Custer, Olivier, Russell, Muftic, 
Denning and/or Davies. 3 Additional motivations include the desire to meet or exceed any 
applicable laws or industry or government standards, such as the Orange Book, Computer Fraud 
and Abuse Act of 1986, Computer Security Act of 1989 PL100-35, High Performance Computing 
Act (HPCA) of 1991 (P.L. 102-194), and Title 17 U.S.C. § 101 et seq. (including, for example, § 
1002). Industry standards include those for communication, such as X.509, TCP/IP, WWW, and 
WAIS, and those for encryption or transmission of encrypted information, e.g., DES, Triple DES, 
RSA, SSL, S/MIME, SHTTP, HTTPS, MD5, and PEM. Additional obviousness teachings to 
combine with such items or information include "security" levels, permissions, certificates, 
tickets, "secure" processors, "secure" storage, "smart" cards (including smart cards able to store 
data and perform computations such as encryption/decryption), tamper resistance techniques for 
hardware and software, physical "security," trusted time, authentication and authorization in 
trusted distributed systems, enabling software or features thereof to run only on particular 
machines, and treating binary information/data at varied levels of granularity. It was further 
obvious to combine any of these "security" features with any of the following software (or 
features thereof) and/or any of the following hardware (or features thereof) to provide any 
element or perform any step shown in the charts below: 

software: file and operating systems such as NT, NFS, Andrew, Netware, Mach, DT 
Mach, Multics, Unix, and in the Blaze and Tanenbaum and other references cited above; 
secure kernels; protocols, codes and systems such as WWW, SSL, SGML, hypertext, Oak, 
Telescript, OOP and other programming technologies or frameworks (e.g. Smalltalk, 
COM, OLE, Bento, Open Doc) 4 ; object-oriented databases; watermarking; obfuscation 
(see, e.g., Choudhury at 15); swIPe; SNMP; auditing; on-line transaction and 


3 Regarding digital music, see also, e.g., J. RatclifF, "Examining PC Audio," Dr. Dobb's Journal 
(March 1993). 

4 For example, it was obvious to use the prior art OOP technologies or frameworks to implement 
the systems described in e.g. Fischer, Linn, Stefik, Choudhury, Telescript, and object-oriented 
databases. 


PAGE 6 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


subscription-based services and billing; electronic payment; on-line banking, 
entertainment and commercial and interactive commerce; encryption and authentication 
(including e.g., "something you are, something you know, something you have"); 
hardware: physical security tools and devices; physically secure locations, physically 
"secure" products such as tamper resistant computers or other devices, "secure" 
processors, "secure" memory, "smart" cards, set-top boxes, portable devices, "secure" 
communication facilities. 
See Stefik, CNI/IMA 94, Chaum, Tygar/Y ee> Choudhury/Maxemchuk, Stefik, Denning, Davies, 
Moffett, Curry, Garfinkel/Spafford, Muftic, Carroll, Hsiao et al. and the other references cited 
above. 

Each of these suggestions and motivations to combine apply to each of the references set 
forth in the attached charts. 

PLR 3-3(c) 

The attached charts identify, for each item of prior art, elements within the scope of 
InterTrust's October 29, 2001 PLR 3-1 allegations for the '683 and '193 patents. The structure, 
act or material for any such element if so construed is set forth in the references identified in the 
attached charts. 5 

PLR 3-3fd) 

Each asserted claim is invalid as indefinite, for lack of enablement, and for lack of the 
written description required by statute. The present basis in each case is each applicable patent 
specification relied upon by InterTrust for the description required by paragraphs one and two of 
Section 1 12, and the prosecution histories of those applications and related applications as 
provided by law. Further basis may include, by way of example, any extrinsic evidence relevant 
to the construction of claim terms; InterTrust's own professed ignorance whether simple acts like 
playing music from a compact disc do not infringe asserted claims; and its difficulty, delay and/or 
inability to identify conception dates or actual reductions to practice of asserted claims. 


5 InterTrust has not identified any claim elements allegedly subject to § 112^6 under PLR 3. 
Should InterTrust do so (and reserving any objection thereto), Microsoft reserves the right to 
respond to that issue. 

PAGE 7 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


"Indefiniteness" of the Asserted InterTrust Patent Claims 6 

In prosecuting, marketing, and enforcing the asserted InterTrust Patents, InterTrust has 
engaged in a pattern of obfuscation as to the scope of the patents, the prior art to the patents, and 
the alleged "inventions" of the patents. For example, InterTrust has mechanically buried Patent 
Office Examiners with a collection of more than 400 references, many of which were not related 
to the claims, and has buried the Examiners with hundreds or thousands of pages of redundant, 
verbose, unclear text, effectively precluding a real comparison of the alleged "invention" versus 
the prior art, and accused non- infringing products of infringement. One result of InterTrust' s 
approach is that the asserted patent claims are indefinite in myriad ways. 

The asserted "claims" are unclear in scope and not nearly as precise as the subject matter 
allows. This indefiniteness arises from many causes, including: 

by use of terms that lacked any ordinary meaning in the art and are undefined in 

the specification; 

by use of terms that are used in the specification in a manner inconsistent with 
their ordinary meaning, but are not specifically defined in the specification; 

by a Section 1 12, U 6 "means (or step) plus function" element having no specific 
structure in the application's written description clearly linked to that claim element 
(examples denoted below by underlining) 7 ; 

by such excessive disclaimers of specificity of a term that the term becomes 
meaningless; 

by inconsistent uses of a term within a single specification; 
by inconsistent uses of a term between a specification and something allegedly 
incorporated into that specification; 

by inconsistencies within the language of a given claim; 
This lack of definiteness is exacerbated by InterTrust trying to apply these claims to the 
very different structures and techniques of (or that InterTrust mistakenly attributes to) Microsoft's 
accused software. Particularly in view of these untenable infringement accusations, the following 
bolded claim terms and phrases are indefinite under 35 U.S.C. § 1 12, ^ 2. Microsoft reserves the 

6 For ease of reference only, the accompanying claim listings use the clause numbering and 
lettering used by InterTrust in its PLR 3-1 Statements. 

7 Other undefined, indefinite claim terms are so ambiguous that one or more possible 
constructions are purely functional such that the term, as so construed, is a Section 1 12, H 6 
limitation. Microsoft, therefore, reserves the right to identify additional claim limitations as 

PAGE 8 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


right to modify this listing, e.g., if and when InterTrust clarifies its infringement and claim 
construction positions. 

493 

1) A method comprising: 

a) receiving a digital file including music; 

b) storing said digital file in a first secure memory of a first device; 

c) storing information associated with said digital file in a secure database stored on said first 
device, said information including at least one budget control and at least one copy control, said 
at least one budget control including a budget specifying the number of copies which can be 
made of said digital file; and said at least one copy control controlling the copies made of said 
digital file; 

d) determining whether said digital file may be copied and stored on a second device based 
on at least said copy control; 

e) if said copy control allows at least a portion of said digital file to be copied and stored on a 
second device, 

f) copying at least a portion of said digital file; 

g) transferring at least a portion of said digital file to a second device including a memory and 
an audio and/or video output; 

h) storing said digital file in said memory of said second device; and 

i) including playing said music through said audio output. 


Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 


a) receiving a digital file 

- "receiving . . . file" is indefinite, e.g., on what 

including music; 

processing, if any, is required to complete this 


"receiving" step, on what receives the "file," and on what 


or where it is received from. 


- "file" is indefinite, e.g., on whether it encompasses or 


excludes a duplicate or "copy" of the "file." 


- "including" is used inconsistently in the specification 


and is indefinite, e.g., on whether it encompasses or 


Section 1 12, T| 6, limitations. 

PAGE 9 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




excludes merely holding a reference. 

b) storing said digital file in a 
first secure memory of a first 
device; 

- see above 

- "storing . . . in" is used inconsistently in the 
specification and is indefinite, e.g., on whether it 
encompasses or excludes merely holding a reference. 

- if "secure memory" is not at least limited to the 
disclosed internal RAM and/or ROM (directly 
addressable by a SPU processor instruction) located 
within the physically protected, "tamper-resistant" 8 SPU, 
the term "secure memory" would be indefinite. 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "secure" from "not secure." 

c) storing information associated 
with said digital file in a secure 
database stored on said first 
device, 

see above 

- if "associated with said digital file" is not at least 
limited to use of the disclosed "component assembly," 
"secure container," "protected processing environment," 
"object registration," and other mechanisms of the 
purported "VDE" "invention" for allegedly individually 
ensuring the "access control" "handcuffs" between 
specific "controls," specific "objects" (and their content 
at an arbitrary granular level), and specific "users," the 
phrase "associated with said digital file" would be 
indefinite. 

- if "secure database" is not at least limited to the 
disclosed "secure database" (including its "secure 


Indefinite claim terms, such as "tamper-resistant," used in describing the indefiniteness of 
other claim terms, are used in their narrowest possible sense. 


PAGE 10 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




database manager" and alleged access control "VDE" 
mechanisms), the term "secure database" would be 
indefinite. 

said information including at 
least one budget control 

- see above 

- "control" is used inconsistently in the specification. 
If "control" is not at least limited to the disclosed 
executable, modular "component assembly" component 
that, inter alia, performs its "VDE" "access control" tasks 
at an arbitrary granular level, the term "control" would 
be indefinite. 

- "budget control" is not used in the specification and 
is indefinite. 

and at least one copy control, 

- see above 

- "copy control" is not used in the specification and is 
indefinite. For example, it is indefinite on whether 
"copy" is used as a verb or a noun. 

"copy" is indefinite, e.g., on whether it encompasses 
or excludes something (or creating something) that is not 
an identical duplicate of the original; and, if it does 
encompass that, then how close that something must be 
to the original to constitute a "copy." 

said at least one budget control 
including a budget specifying 
the number of copies which can 
be made of said digital file; 

see above 

- "budget" is used inconsistently in the specification 
and is indefinite. For example, apparently it is used to 
refer sometimes to a "method," sometimes to a 
"component assembly," sometimes to a value, and 
sometimes to a UDE data structure. 

- "copies" is indefinite (see "copy" above) 

if the phrase "specifying the number of copies which 
can be made of said digital file" is not at least limited to 
meaning the total global number of "copies" that ever 
will have been made of that "file" at any time, by any 


PAGE 1 1 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




"user," by any device, and for any length of persistence, 
it would be indefinite. 

and said at least one copy control 
controlling the copies made of 
said digital file; 

- see above 

- if "controlling" is not at least limited to use of the 
disclosed "component assembly," "protected processing 
environment," "object registration," "secure container," 
and other mechanisms of the purported "VDE" 
"invention" for allegedly individually ensuring that 
specific "controls" are enforced vis-a-vis specific objects 
(and their content at an arbitrary granular level) and 
specific "users," the term "controlling" would be 
indefinite. 

- the phrase "controlling the copies made of said 
digital file" is indefinite, e.g., on whether it refers to 
"controlling" the process of "copying" the "file," or 
"controlling" all resulting "copies" of the "file," or both. 

d) determining whether said 
digital file may be copied and 
stored on a second device based 
on at least said copy control; 

- see above 

- "copied" is indefinite (see "copy" above) 

- "determining whether said digital file may be copied 
and stored on a second device" is indefinite, e.g., on 
whether this step determines whether the "file" may be 
"copied" on a second device, on whether one or more 
determinations are made. 

- "a second device" is indefinite, e.g., on whether it 
means "any" second device or a particular second device. 

- depending on the construction of other claim 
limitations, such as "at least one copy control controlling 
the copies made of said digital file" the phrase "based on 
at least said copy control" may be inconsistent with other 
limitations of this claim and thus may be indefinite. 

e) if said copy control allows at 
least a portion of said digital file 

- see above 

- "a portion of said digital file" is indefinite, e.g., on 


PAGE 12 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



to be copied and stored on a 
second device, 

whether it encompasses or excludes matter that is merely 
referenced within the "file." 

- depending on the construction of other claim 
limitations, such as "based on at least said copy control," 
the phrase "if said copy control allows" may be 
inconsistent with other limitations of this claim and thus 
may be indefinite. 

- depending on the construction of other claim 
limitations, such as "at least one copy control controlling 
the copies made of said digital file," the phrase "if said 
copy control allows at least a portion of said digital file 
to be copied" may be inconsistent with other limitations 
of this claim, and thus may be indefinite. 

f) copying at least a portion of 

said digital file; 

- see above 

- "copying" is indefinite, e.g., on whether it 
encompasses or excludes creating something that is not 
an identical duplicate of the original; and, if it does 
encompass that, then how close that something must be 
to the original to constitute a "copy." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "copy control." 

g) transferring at least a portion 
of said digital file to a second 
device 

- see above 

- "transferring" is indefinite, e.g., on how it differs, if 
at all, from "moving" or "copying." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "copy control." 

- "at least a portion" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 


PAGE 13 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




excludes a "portion" not "copied" in the preceding step. 
- "a second device" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it is limited to the same 
particular second device referred to earlier in the claim 
(to the extent the claim earlier refers to a particular 
second device). 

including a memory 

- "memory" is indefinite, e.g., on whether it 
encompasses or excludes storage that is not directly 
addressable by the processor. 

and an audio and/or video 
output; 

- "audio and/or video output" is indefinite, e.g., it is 
inconsistent with the later claim recitation of "said audio 
output." 

h) storing said digital file in said 
memory of said second device; 
and 

- see above 

i) including playing said music 
through said audio output. 

- "said audio output" is indefinite, e.g., it is 
inconsistent with the earlier claim recitation of "audio 
and/or video output." 


2) A method as in claim 1, further comprising: 

a) at a time substantially contemporaneous with said transferring step, recording in said first 
device information indicating that said transfer has occurred. 


Following are some examples of the additional ways in which this dependent claim and 
these claim terms and phrases are indefinite on the face of the patent and/or as apparently 
construed by InterTrust: 


at a time substantially 
contemporaneous with said 
transferring step, 

- see above 

- "a time substantially contemporaneous with" is not 
used in the specification, and is indefinite. 

recording in said first device 
information indicating that said 

- "transfer" is indefinite, e.g., on how it differs, if at 
all, from "move" or "copy." 


PAGE 14 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


transfer has occurred. 


- "information indicating that said transfer has 
occurred" is indefinite, e.g., on the extent to which the 
information identifies "said transfer," e.g., what was 
"transferred" and/or to what it was "transferred." 


3) A method as in claim 2, in which: 

a) said information indicating that said transfer has occurred includes an encumbrance on 
said budget. 


Following are some examples of the additional ways in which this dependent claim and 
these claim terms and phrases are indefinite on the face of the patent and/or as apparently 


construed by InterTrust: 

a) said information indicating 

- see above 

that said transfer has occurred 

- "an encumbrance on said budget" is indefinite, e.g., 

includes an encumbrance on 

for the same reasons that "budget" is indefinite, and, as 

said budget. 

to its function and structure, and on whether it must be 


uniquely identifiable with respect to the universe of 


"VDE" nodes. 


4) A method as in claim 3, in which: 

a) said encumbrance operates to reduce the number of copies of said digital file authorized 
by said budget. 


Following are some examples of the additional ways in which this dependent claim and 
these claim terms and phrases are indefinite on the face of the patent and/or as apparently 
construed by InterTrust: 


said encumbrance operates to 
reduce the number of copies of 
said digital file authorized by 
said budget. 


- see above 

- "operates to reduce the number of copies of said 
digital file authorized by said budget" is indefinite, e.g., 
on whether it reduces the total global number of "copies" 
that ever will have been made of that "file" at any time, 


PAGE 15 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



by any "user," by any device, and for any length of 


persistence, and on meaning of an "encumbrance" 


"operating." 


1 1) A method comprising: 
2. receiving a digital file; 

b) storing said digital file in a first secure memory of a first device; 

c) storing information associated with said digital file in a secure database stored on said first 
device, said information including a first control; 

d) determining whether said digital file may be copied and stored on a second device based 
on said first control, said determining step including identifying said second device and 
determining whether said first control allows transfer of said copied file to said second device, 
said determination based at least in part on the features present at the device to which said 
copied file is to be transferred; 

e) if said first control allows at least a portion of said digital file to be copied and stored on a 
second device, 

f) copying at least a portion of said digital file; 

g) transferring at least a portion of said digital file to a second device including a memory and 
an audio and/or video output; 

h) storing said digital file in said memory of said second device; and 
2. rendering said digital file through said output. 


Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 


a) receiving a digital file; 

- "receiving . . . file" is indefinite, e.g., on what 
processing, if any, is required to complete this 
"receiving" step, on what receives the "file," and on what 
or where it is received from. 

- "file" is indefinite, e.g., on whether it encompasses or 
excludes a duplicate or "copy" of the "file." 

b) storing said digital file in a 
first secure memory of a first 

see above 

- "storing . . . in" is used inconsistently in the 


PAGE 16 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



device; 

specification and is indefinite, e.g., on whether it 
encompasses or excludes merely holding a reference. 

- if "secure memory" is not at least limited to the 
disclosed internal RAM and/or ROM (directly 
addressable by a SPU processor instruction) located 
within the physically protected, "tamper-resistant" SPU, 
the term "secure memory" would be indefinite. 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "secure" from "not secure." 

c) storing information associated 
with said digital file in a secure 
database stored on said first 
device, 

- see above 

- if "associated with said digital file" is not at least 
limited to use of the disclosed "component assembly " 
"secure container," "protected processing environment," 
"object registration," and other mechanisms of the 
purported "VDE" "invention" for allegedly individually 
ensuring the "access control" "handcuffs" between 
specific "controls," specific "objects" (and their content 
at an arbitrary granular level), and specific "users," the 
phrase "associated with said digital file" would be 
indefinite. 

- if "secure database" is not at least limited to the 
disclosed "secure database" (including its "secure 
database manager" and alleged access control "VDE" 
mechanisms), the term "secure database" would be 
indefinite. 

said information including a first 
control 

- see above 

- "including" is used inconsistently in the specification 


PAGE 17 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




and is indefinite, e.g., on whether it encompasses or 
excludes merely holding a reference. 
- "control" is used inconsistently in the specification. 
If "control" is not at least limited to the disclosed 
executable, modular "component assembly" component 
that, inter alia, performs its "VDE" "access control" tasks 
at an arbitrary granular level, the term "control" would 
be indefinite. 

d) determining whether said 
digital file may be copied and 
stored on a second device based 
on said first control; 

- see above 

- "copied" is indefinite (see "copy" above) 

- "determining whether said digital file may be copied 
and stored on a second device" is indefinite, e.g., on 
whether this step determines whether the file may be 
"copied" on a second device. 

- "a second device" is indefinite, e.g., on whether it 
means "any" second device or a particular second device. 

- "determining whether said digital file may be copied 
and stored on a second device based on said first control" 
is indefinite; e.g., it is inconsistent with the later claim 
limitation "if said first control allows at least a portion of 
said digital file to be copied and stored on a second 
device" 

said determining step including 
identifying said second device 
and determining whether said first 
control allows transfer of said 
copied file to said second device, 

- see above 

- "identifying said second device" is indefinite, e.g., on 
whether the identification is of the type of device or of 
the particular second device unit, and on whether it is a 
unique identification. 

- "transfer" is indefinite, e.g., on how it differs, if at 
all, from "move" or "copy." 

- "said copied file" lacks antecedent basis, and is 
indefinite. For example, the preceding limitations do not 
recite the "copying" of any "file" that could be an 


PAGE 18 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




antecedent for " said copied file." 
- if "copied file" is not at least limited to a "file" that 
has been "copied" at least once, then "copied file" would 
be indefinite. 

said determination based at least 
in part on the features present at 
the device to which said copied 
file is to be transferred; 

- "said determination" is indefinite as to its antecedent 
basis (e.g., "determining whether said digital file may be 
copied and stored ..." or "determining whether said first 
control allows transfer ...."). 

- "the features present at the device" is indefinite, e.g., 
on whether "the features" means all or any particular 
type of features, on what has these "features," and on the 
relationship, if any, of "features present at the device" to 
features of the device. 

- "to which said copied filed is to be transferred" is 
indefinite. For example, it is inconsistent with the other 
claim limitations reciting that "transfer" may not be 
allowed. 

- "transferred" is indefinite, e.g., on how it differs, if at 
all, from "moved." 

e) if said first control allows at 
least a portion of said digital file 
to be copied and stored on a 
second device, 

- see above 

- "a portion of said digital file" is indefinite, e.g., on 
whether it encompasses or excludes matter that is merely 
referenced within the "file." 

- "a second device" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it is limited to the "said 
second device" recited earlier in the claim. 

- depending on the construction of other claim 
limitations, such as determining whether said digital file 
may be copied and stored on a second device based on 
said first control," the phrase "if said first control allows 
at least a portion of said digital file to be copied and 
stored on a second device" may be inconsistent with 


PAGE 19 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




other limitations of this claim, and thus may be 
indefinite. 

f) copying at least a portion of 

said digital file; 

see above 

- "copying" is indefinite, e.g., on whether it 
encompasses or excludes creating something that is not 
an identical duplicate of the original; and, if it does 
encompass that, then how close that something must be 
to the original to constitute a copy. 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "first control." 

g) transferring at least a portion 
of said digital file to a second 
device 

see above 

- "transferring" is indefinite, e.g., on how it differs, if 
at all, from "moving" or "copying." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "first control." 

- "at least a portion" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "copied" in the preceding step. 

- "a second device" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it is limited to the said 
second device" recited earlier in the claim. 

including a memory 

memory is indefinite, e.g., on whether it 
encompasses or excludes storage that is not directly 
addressable by the processor. 

and an audio and/or video 
output; 

- "audio and/or video output" is indefinite. 

h) storing said digital file in said 
memory of said second device; 

- see above 

- "storing said digital file" is indefinite and 


PAGE 20 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



and 

inconsistent with other claim limitations, e.g., 
"transferring at least a portion of said digital file to a 
second device." 

1) rendering said digital file 
through said output. 

- see above 

- "rendering said digital file" is indefinite and 
inconsistent with other claim limitations, e.g., 
"transferring at least a portion of said digital file to a 
second device." 


15) A method comprising: 
2. receiving a digital file; 

b) an authentication step comprising: 

c) accessing at least one identifier associated with a first device; and 

d) determining whether said identifier is associated with a device and/or user authorized to 
store said digital file; 

e) storing said digital file in a first secure memory of said first device, but only if said device 
and/or user is so authorized, but not proceeding with said storing if said device and/or user 
is not authorized; 

f) storing information associated with said digital file in a secure database stored on said first 
device, said information including at least one control; 

g) determining whether said digital file may be copied and stored on a second device based 
on said at least one control; 

h) if said at least one control allows at least a portion of said digital file to be copied and 
stored on a second device, 

2. copying at least a portion of said digital file; 

j) transferring at least a portion of said digital file to a second device including a memory and 
an audio and/or video output; 

k) storing said digital file in said memory of said second device; and 
1) rendering said digital file through said output. 

Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 

PAGE 21 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



a) receiving a digital file; 

"receiving . . . file" is indefinite, e.g., on what 
processing, if any, is required to complete this 
"receiving" step, on what receives the "file," and on what 
or where it is received from. 

- "file" is indefinite, e.g., on whether it encompasses or 
excludes a duplicate or "copy" of the "file." 

b) an authentication step 

comprising: 

- "authentication step" is indefinite, e.g., for the 
reasons set forth below. 

c) accessing at least one 
identifier associated with a first 
device or with a user of said 
first device; and 

- "accessing" is indefinite, e.g., on whether it 
encompasses or excludes ascertaining the information 
content of what is "accessed" (e.g., decrypting any 
encrypted information). 

- if "identifier" is not at least limited to a value that 
uniquely identifies a particular device or "user," it would 
be indefinite. 

- "identifier associated with" is indefinite, e.g., on 
whether the "identifier" is uniquely "associated with." 

- "identifier associated with a first device or with a 
user of said first device" is indefinite and inconsistent 
with the later claim recitation of "determining whether 
said identifier is associated with a device and/or user . . .." 

- "a user of said first device" is indefinite, e.g., on 
whether the "user" is a current, past, or potential "user" 
of the device. 

d) determining whether said 
identifier is associated with a 
device and/or user authorized to 
store said digital file; 

- "determining whether said identifier is associated 
with a device and/or user is indefinite and mconsistent 
with the preceding claim limitation of an "identifier 
associated with a first device or with a user of said first 
device." 

- "authorized to store said digital file" is indefinite, 
e.g., on whether such "authorization" is conditional or 


PAGE 22 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




unconditional. 

e) storing said digital file in a 
first secure memory of said first 
device, 

- see above 

- "storing ... in" is used inconsistently in the 
specification and is indefinite, e.g., on whether it 
encompasses or excludes merely holding a reference. 

- if "secure memory" is not at least limited to the 
disclosed internal RAM and/or ROM (directly 
addressable by a SPU processor instruction) located 
within the physically protected, "tamper-resistant" SPU, 
the term "secure memory" would be indefinite. 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "secure" from "not secure." 

but only if said device and/or 
user is so authorized, but not 
proceeding with said storing if 
said device and/or user is not 
authorized; 

- "said device and/or user" is indefinite and has an 
indefinite antecedent basis (e.g., "a device and/or user 
authorized to store said digital file" or "at least one 
identifier associated with a first device or with a user of 
said first device"). 

- "so authorized" is indefinite and has an indefinite 
antecedent basis (e.g., "authorized" for "storing said 
digital file in a first secure memory of said first device" 
or "authorized to store said digital file"). 

- "but only if said device and/or user is so authorized" 
is mconsistent witn but not proceeding with said storing 
if said device and/or user is not authorized," rendering 
both phrases indefinite. 

f) storing information associated 
with said digital file in a secure 

see above 

- if "associated with said digital file" is not at least 


PAGE 23 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



database stored on said first 
device, 

limited to use of the disclosed "component assembly," 
"secure container," "protected processing environment," 
"object registration," and other mechanisms of the 
purported "VDE" "invention" for allegedly individually 
ensuring the "access control" "handcuffs" between 
specific "controls," specific "objects" (and their content 
at an arbitrary granular level), and specific "users," the 
phrase "associated with said digital file" would be 
indefinite. 

- if "secure database" is not at least limited to the 
disclosed "secure database" (including its "secure 
database manager" and alleged access control "VDE" 
mechanisms), the term "secure database" would be 
indefinite. 

said information including at 
least one control 

see above 

- "including" is used inconsistently in the specification 
and is indefinite, e.g., on whether it encompasses or 
excludes merely holding a reference. 

- "control" is used inconsistently in the specification. 
If "control" is not at least limited to the disclosed 
executable, modular "component assembly" component 
that, inter alia, performs its "VDE" "access control" tasks 
at an arbitrary granular level, the term "control" would 
be indefinite. 

g) determining whether said 
digital file may be copied and 
stored on a second device based 
on said at least one control; 

see above 

- "copied" is indefinite (see "copy" above) 

- "determining whether said digital file may be copied 
and stored on a second device based on said at least one 
control" is indefinite, e.g., on whether this step 
determines whether the "file" may be "copied" on a 
second device. 

- "a second device" is indefinite, e.g., on whether it 


PAGE 24 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




means "any" second device or a particular second device. 

h) if said at least one control 
allows at least a portion of said 
digital file to be copied and 
stored on a second device, 

- see above 

- "a portion of said digital file" is indefinite, e.g., on 
whether it encompasses or excludes matter that is merely 
referenced within the "file." 

- depending on the construction of other claim 
limitations, such as "determining whether said digital file 
may be copied and stored on a second device based on 
said at least one control," the phrase "if said at least one 
control allows at least a portion of said digital file to be 
copied" may be inconsistent with other limitations of this 
claim, and thus may be indefinite. 

i) copying at least a portion of 

said digital file; 

- see above 

- "copying" is indefinite, e.g., on whether it 
encompasses or excludes creating something that is not 
an identical duplicate of the original; and, if it does 
encompass that, then how close that something must be 
to the original to constitute a "copy." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "at least one control." 

j) transferring at least a portion 
of said digital file to a second 
device 

see above 

- "transferring" is indefinite, e.g., on how it differs, if 
at all, from "moving" or "copying." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "at least one control." 

- "at least a portion" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "copied" in the preceding step. 


PAGE 25 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




a second device is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it is limited to the same 
particular second device referred to earlier in the claim 
(to the extent the claim earlier refers to a particular 
second device). 

including a memory 

- "memory" is indefinite, e.g., on whether it 
encompasses or excludes storage that is not directly 
addressable by the processor. 

and an audio and/or video 
output; 

- "audio and/or video output" is indefinite. 

n) storing said digital tile in said 
memory of said second device; 
and 

- see above 

- "storing said digital file" is indefinite and 
inconsistent with other claim limitations, e.g., 
"transferring at least a portion of said digital file to a 
second device." 

i) rendering said digital file 
through said output. 

5CC aUUVC 

- "rendering said digital file" is indefinite and 
inconsistent with other claim limitations, e.g., 
"transferring at least a portion of said digital file to a 
second device." 


19) A method comprising: 

a) receiving a digital file at a first device; 

b) establishing communication between said first device and a clearinghouse located at a 
location remote from said first device; 

c) said first device obtaining authorization information including a key from said 
clearinghouse : 

d) said first device using said authorization information to gain access to or make at least one 
use of said first digital file, including using said key to decrypt at least a portion of said first 
digital file; and 

e) receiving a first control from said clearinghouse at said first device; 

PAGE 26 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


f) storing said first digital file in a memory of said first device; 

g) using said first control to determine whether said first digital file may be copied and 
stored on a second device; 

h) if said first control allows at least a portion of said first digital file to be copied and stored 
on a second device, 

i) copying at least a portion of said first digital file; 

j) transferring at least a portion of said first digital file to a second device including a memory 
and an audio and/or video output; 

k) storing said first digital file portion in said memory of said second device; and 
1) rendering said first digital file portion through said output. 


Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 


t\\ recpivino a Hiaital HIa at a firct 
aj i^vtriruig a Ulgllal lilt at a Hial 

device; 

"receiving ... at" is indefinite, e.g., on what 
processing, if any, is required to complete this 
"receiving" step, and on what or where it is received 
from. 

- "file" is indefinite, e.g., on whether it encompasses or 
excludes a duplicate or "copy" of the "file." 

b) establishing communication 
between said first device and a 
clearinghouse located at a 
location remote from said first 
device; 

- "establishing communication between" is indefinite, 
e.g., on whether this step requires one or more 
"communications," on whether two-way 
"communication" must be established, and on the nature 
of the "communication." 

- "location remote from" is indefinite, e.g., on how 
"remoteness" is determined. 

- "clearinghouse" is indefinite. For example, it 
vaguely suggests a function without suggesting any 
particular structure for performing such function. No 
particular corresponding structure is adequately 
described in the specification. 

c) said first device obtaining 

- if "authorization information" is not at least limited 


PAGE 27 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



authorization information 
including a key from said 
clearinghouse: 

to (1) the disclosed executable, modular "component 
assembly" component that, inter alia, performs its 
"VDE" "access control" tasks at an arbitrary granular 
level, and (2) the key and other data used thereby, the 
term "authorization information" would be indefinite. 
- "including" is used inconsistently in the specification 
and is indefinite, e.g., on whether it encompasses or 
excludes merely holding a reference. 

d) said first device using said 
authorization information to 
gain access to or make at least 
one use of said first digital file, 
including using said key to 
decrypt at least a portion of said 
first digital file; and 

- "gain access to" is indefinite, e.g., on whether it 
encompasses or excludes ascertaining the information 
content of what is "accessed" (e.g., decrypting any 
encrypted information). 

- "use" is indefinite and is used inconsistently in the 
specification, e.g., on whether or not it encompasses or 
excludes "distribution," "extraction," "manipulating," 
and/or "copying." 

e) receiving a first control from 
said clearinghouse at said first 
device; 

see above 

- "control" is used inconsistently in the specification. 
If control" is not at least limited to the disclosed 
executable, modular "component assembly" component 
that, inter alia, performs its "VDE" "access control" tasks 
at an arbitrary granular level, the term "control" would 
be indefinite. 

f) storing said first digital file in 
a memory of said first device; 

- see above 

- "storing . . . in" is used inconsistently in the 
specification and is indefinite, e.g., on whether it 
encompasses or excludes merely holding a reference. 

niciiiury ib maeiiniie, e.g., on wne trier it 
encompasses or excludes storage that is not directly 
addressable by the processor. 

g) using said first control to 
determine whether said first 

- see above 

- "copied" is indefinite, e.g., on whether it 


PAGE 28 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



digital file may be copied and 
stored on a second device; 

encompasses or excludes creating something that is not 
an identical duplicate of the original; and if it does 
encompass that, then how clear that something must be 
to the original to constitute a "copy." 

- "determine whether said first digital file may be 
copied and stored on a second device" is indefinite, e.g., 
on whether this step determines whether the "file" may 
be "copied" on a second device. 

- "a second device" is indefinite, e.g., on whether it 
means "any" second device or a particular second device. 

- "using said first control to determine whether said 
tirst digital file may be copied and stored on a second 
device" is indefinite; e.g., it is inconsistent with the later 
claim limitation "if said first control allows at least a 
portion of said first digital file to be copied and stored on 
a second device" 

h) if said first control allows at 
least a portion of said first 
digital file to be copied and 
stored on a second device, 

see above 

- "a portion of said digital file" is indefinite, e.g., on 
whether it encompasses or excludes matter that is merely 
referenced within the "file." 

- depending on the construction of other claim 
limitations, such as "using said first control to determine 
whether said first digital file may be copied and stored on 
a second device" the phrase "if said first control allows at 
least a portion of said first digital file to be copied" may 
be inconsistent with other limitations of this claim, and 
thus may be indefinite. 

i) copvins at least a oortion of 

said first digital file; 

_ CPA tlY\f\\ff* 

ot/W uUUVC 

- "copying" is indefinite, e.g., on whether it 
encompasses or excludes creating something that is not 
an identical duplicate of the original; and, if it does 
encompass that, then how close that something must be 


PAGE 29 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




to the original to constitute a "copy." 
- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "first control." 

j) transferring at least a portion 

of said first digital file to a 
second device 

- see above 

- "transferring" is indefinite, e.g., on how it differs, if 
at all, from "moving" or "copying." 

- "at least a portion" is indefinite and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a "portion" not "allowed" "to be copied and 
stored on a second device" by the "first control." 

- "at least a portion" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it encompasses or 
excludes a portion not "copied" in the preceding step. 

- "a second device" is indefinite, and has an indefinite 
antecedent basis, e.g., on whether it is limited to the same 
particular second device referred to earlier in the claim 
(to the extent the claim earlier refers to a particular 
second device). 

including a memory 

- see above 

and an audio and/or video 
output; 

- "audio and/or video output" is indefinite. 

lc^ storing Q?iiH firct Hioitnl filo 

ivy auri mg oaiu liiol Ulglual 

portion in said memory of said 
second device; and 

see above 

1) rendering said first digital file 
portion through said output. 

- see above 


'683 

2. A system including: 


PAGE 30- MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


a first apparatus including, 
user controls, 

a communications port, 

a processor, 

a memory storing: 

a first secure container containing a governed item, the first secure container governed item 
being at least in part encrypted; the first secure container having been received from a second 
apparatus; 

a first secure container rule at least in part governing an aspect of access to or use of said 
first secure container governed item, the first secure container rule, the first secure container 
rule having been received from a third apparatus different from said second apparatus; and 
hardware or software used for receiving and opening secure containers. said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers : 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said first apparatus, said 
protected processing environment including hardware or software used for applying said 
first secure container rule and a second secure container rule in combination to at least in 
part govern at least one aspect of access to or use of a governed item contained in a secure 
container : and 

hardware or software used for transmission of secure containers to other apparatuses or for 
the receipt of secure containers from other apparatuses . 


Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 


2. A system including: 


a first apparatus including, 

- the claim is indefinite on which of the recited 
elements are included in the "first apparatus." 

user controls, 

- "user controls" is indefinite. 

a communications port, 


a processor, 


a memory storing: 

- "memory" is indefinite, e.g., on whether it 


PAGE 3 1 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




encompasses or excludes storage that is not directly 
addressable by the processor. 

- "storing" is used inconsistently in at least the 
allegedly incorporated specification and is indefinite, 
e.g., on whether it encompasses or excludes merely 
holding a reference. 

- the claim is indefinite on which of the recited 
elements are "stored" in the "memory." 

a first secure container 
containing a governed item, 

- "secure container" is indefinite, e.g., on its structure 
and certain of its functions, on whether it encompasses or 
excludes "virtual container." The specification does not 
disclose adequate corresponding structure under Section 
112,1(6. 

- "container" is indefinite, e.g., on its structure and 
certain of its functions, and on what distinguishes a 
single "container" from two separate "containers." 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "secure" from "not secure." 

- "storing . . . secure container" is indefinite, e.g., on 
what part, if any, of the "container" may merely be 
referenced from within the memory. 

- "containing" is indefinite and used inconsistently in 
at least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "containing." 


PAGE 32 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




- if "govern" is not at least limited to preventing 
unapproved user processing of a particular item on a per 
item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
"objects" (and their content at an arbitrary granular 
level), and specific users, the term "governed" (and 
"governed item") would be indefinite. 

- "a governed item," is indefinite, e.g., on what 
distinguishes "a governed item" from two separate 
governed items. 

the first secure container 
governed item being at least in 
part encrypted; 

- see above 

the first secure container 
having been received from a 
second apparatus; 

- see above 

- "received" is indefinite, e.g., on what processing, if 
any, is required to complete this "receipt," and on what 
"received" the "received" item. 

- "having been received from" recites the (possibly 
unknowable) history of a component (or something 
stored in a component) rather than the structure or 
function of the component, apparatus or system, thereby 
rendering this apparatus claim indefinite. 

- "received from a second apparatus" is indefinite, e.g., 
\ju wu^ui^i uii& cii^uiiipaaaco or excludes receipt rrom 
some intermediary between the second apparatus and 
first apparatus. 

a first secure container rule at 
least in part governing an 

see above 

- "rule" is indefinite and is used inconsistently in the 


PAGE 33- MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


aspect of access to or use of 

specification. For example, the relationship between a 

said first secure container 

"rule" and a "control" is indefinite. 

governed item, 

"secure container rule" is indefinite and not used in 


the specification. 


- "at least in part" is indefinite, and, under some 


possible meanings, inconsistent with "governing." 


- if "governing" is not at least limited to preventing 


unapproved user processing of a particular item on a per 


item basis by use of the disclosed "component 


assembly," "secure container," "protected processing 


environment," "object registration," and other 


mechanisms of the purported "VDE" "invention" for 


allegedly individually ensuring the "access control" 


"handcuffs" between specific "controls," specific 


"objects" (and their content at an arbitrary granular 


level), and specific users, the term "governing" would be 


indefinite. 


- "at least in part governing" is indefinite, e.g., on how 


to identify when this act of "governing" has begun, is 


ongoing, or has ended. 


- "access" is indefinite, e.g., on whether it 


encompasses or excludes determining the information 


content of what is "accessed" (e.g., decrypting any 


encrypted information). 


- "use" is indefinite and is used inconsistently in the 


allegedly incorporated specification, e.g., on whether or 


not it encompasses or excludes "distribution," 


extraction, manipulating, and/or copying. 


"an aspect of access to or use of is indefinite. 

the first secure container rule, 

see above 


- the claim is indefinite on the significance of this 


repetition of the phrase "the first secure container rule." 


PAGE 34 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



the first secure container rule 
having been received from a 
third apparatus different from 
said second apparatus; and 

- see above 

- "received from a third apparatus" is indefinite, e.g., 
on whether this encompasses or excludes receipt from 
some intermediary between the third apparatus and first 
apparatus. 

hardware or software used for 
receiving and opening secure 
containers. 

see above 

- "receiving" is indefinite, e.g., on what processing, if 
any, is required to complete this "receiving" step, on 
what receives the "secure containers," and on what or 
where they are received from. 

- if "opening secure containers" is not at least limited 
to successful completion of the "OPEN method" 
expressly disclosed in the allegedly incorporated 
specification, the phrase "opening secure containers" 
would be indefinite. 

"hardware or software used for receiving and opening 
secure containers," is indefinite, e.g., on the structure of 
this "hardware or software," and on whether the same 
"hardware or software" performs both "receiving" and 
"opening." The specification does not disclose adequate 
corresponding structure. 


said secure containers each 
including the capacity to 
contain a governed item, 

- see above 

- if "said secure containers" is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 
to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" would be 
indefinite. 

- "contain" is indefinite and used inconsistently in at 
least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 


PAGE 35 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 
- "including the capacity to contain a governed item" is 
indefinite, e.g., on the manner in which a capacity" is 
included in a "secure container," and on whether the 
"capacity to contain" must apply to some particular 
"governed item" or to every "governed item" without 
limitation. 

a secure container rule being 
associated with each of said 
secure containers: 

see above 

- if "being associated with . . . secure containers" is not 
at least limited to use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
"objects" (and their content at an arbitrary granular 
level), and specific users, the phrase "being associated 
with ... secure containers" would be indefinite. 

- if said secure containers is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 
to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" is indefinite. 


a protected processing 
environment at least in part 
protecting information 

pftntfiiripH in caiH nrnfopi'aH 
luiiiaiucu in adiu pruicllcU 

processing environment from 
tampering by a user of said 
first apparatus, 

- "protected" is indefinite. It is an amorphous term 
that the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
oi tnreans; is (are; oeing addressed (e.g., coniidentiality ? 
integrity? authentication? non-repudiation? availability?), 
and on the nature and the level(s) of protection from 
those threats that separate(s) "protected" from "not 
protected." 


PAGE 36 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


- if "protected processing environment" is not at least 
limited to excluding the processor and "memory" recited 
earlier in the claim, and is not at least limited to 
executing software and/or hardware (if any) expressly 
disclosed in the specification and identified as a 
"protected processing environment," the term "protected 
processing environment" would be indefinite. 

- if "protecting" is not at least limited to preventing 
unauthorized "user" processing of a particular item on a 
per item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
"objects" (and their content at an arbitrary granular 
level), and specific "users," the term "protecting" would 
be indefinite. 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "protecting." 

- "information contained in said protected processing 
environment" is indefinite, e.g., on what aspects of a 
"protected processing environment" can "contain" 
information, and on whether "contain" encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 

- "protecting from . . . tampering" is indefinite, e.g., on 
the specific threat(s) being addressed, and on the level(s) 
and nature of protection from those threats. 

- "a user of said first apparatus" is indefinite, e.g., on 
whether "a user" means "any user" or a particular "user." 


PAGE 37 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


said protected processing 
environment including 
hardware or software used for 
applying said first secure 
container rule and a second 
secure container rule in 
combination to at least in part 


govern at least one aspect of 
access to or use of a governed 


item contained in a secure 
container : and 


- see above 

- "said first secure container rule and a second secure 
container rule" is indefinite, e.g., on what distinguishes a 
single "rule" from two separate "rules." 

- "hardware or software used for applying ... in a 
secure container" is indefinite, e.g., on the structure of 
this "hardware or software." The specification does not 
disclose adequate corresponding structure. 

- "applying ... in combination" is indefinite, e.g., on the 
manner in which the "rules" are merged and applied. 

- "contained in" is indefinite and used inconsistently in 
at least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference in, and, if it does 
encompass merely holding a reference in, what type of 
reference suffices to constitute "contained in." 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "govern." 

- if "govern" is not at least limited to preventing 
unauthorized "user" processing of a particular item on a 
per item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
Objects" (and their content at an arbitrary granular 
level), and specific "users," the term "govern" would be 
indefinite. 

"a governed item contained in a secure container" is 
indefinite and has no or an indefinite antecedent basis as 
both "a governed item" and "a secure container." 


PAGE 38- MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING US PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



hardware or software used for 

- see above 

transmission of secure 

"hardware or software used for transmission ... or for 

containers to other 

the receipt ... from other apparatuses" is indefinite, e.g., 

apparatuses or for the receipt 

on the structure of this "hardware or software," and on its 

of secure containers from other 

relationship, if any, with the previously recited 

apparatuses. 

"hardware or software used for receiving and opening 
secure containers," and on its relationship, if any, with 
any other element recited in the claim. The specification 
does not disclose adequate corresponding structure. 

28. A system including; 


a first apparatus including; 


user controls, 


a communications port, 


a processor, 



a memory containing a first rule, 

hardware or software used for receiving and opening secure containers. said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers ; 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said first apparatus, said 
protected processing environment including hardware or software used for applying said 
first rule and a secure container rule in combination to at least in part govern at least one 
aspect of access to or use of a governed item ; and 

hardware or software used for transmission of secure containers to other apparatuses or for 
the receipt of secure containers from other apparatuses : and 
a second apparatus including: 
user controls, 

a communications port, 
a processor, 

a memory containing a second rule, 


PAGE 39 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


hardware or software used for receiving and opening secure containers. said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers ; 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said apparatus, said 
protected processing environment including hardware or software used for applying said 
second rule and a secure container rule in combination to at least in part govern at least one 
aspect of access to or use of a governed item : 

hardware or software used for transmission of secure containers to other apparatuses or for 

the receipt of secure containers from other apparatuses : and 

an electronic intermediary , said intermediary including a user rights authority 

clearinghouse. 


Following are some examples of the many ways in which this claim and these claim terms 
and phrases are indefinite on the face of the patent and/or as apparently construed by InterTrust: 


28. A system including: 


a first apparatus including, 

- the claim is indefinite on which of the recited 
elements are included in the "first apparatus." 

user controls, 

"user controls" is indefinite. 

a communications port, 


a processor, 


a memory containing a first 
rule, 

- "memory" is indefinite, e.g., on whether it 
encompasses or excludes storage that is not directly 
addressable by the processor. 

- "containing" is indefinite and used inconsistently in 
at least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "containing." 

- "rule" is indefinite and is used inconsistently in the 
specification. For example, the relationship between a 


PAGE 40 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


"rule" and a "control" is indefinite. 


hardware or software used for 


see above 


receiving and opening secure 
containers . 


- "receiving" is indefinite, e.g., on what processing, if 
any, is required to complete this "receiving" step, on 


what receives the "secure containers," and on what or 
where they are received from. 

- if "opening secure containers" is not at least limited 
to successful completion of the "OPEN method" 
expressly disclosed in the allegedly incorporated 
specification, the phrase "opening secure containers" 
would be indefinite. 

- "secure container" is indefinite, e.g., on its structure 
and certain of its fixnctions, and on whether it 
encompasses or excludes "virtual container." The 
specification does not disclose adequate corresponding 
structure under Section 1 12, ^ 6. 

- "container" is indefinite, e.g., on its structure and 
certain of its functions, and on what distinguishes a 
single "container" from two separate "containers." 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "secure" from "not secure." 

- "hardware or software used for receiving and opening 
secure containers," is indefinite, e.g., on the structure of 
this "hardware or software," and on whether the same 
"hardware or software" performs both "receiving" and 
"opening." The specification does not disclose adequate 
corresponding structure. 


PAGE 41 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



said secure containers each 
including the capacity to 
contain a governed item, 

see above 

- if "said secure containers" is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 
to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" would be 
indefinite. 

- "contain" is indefinite and used inconsistently in at 
least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 

a governed item, is indefinite, e.g., on what 
distinguishes "a governed item" from two separate 
"governed items." 

- "including the capacity to contain a governed item" is 
indefinite. 

a secure container rule being 
associated with each of said 
secure containers: 

see above 

- if "associated with ... secure containers" is not at least 
limited to use of the disclosed "component assembly," 
"secure container," "protected processing environment," 
"object registration," and other mechanisms of the 
purported "VDE" "invention" for allegedly individually 
ensuring the "access control" "handcuffs" between 
specific "controls," specific "objects" (and their content 
at an arbitrary granular level), and specific "users," the 

DliraSe "aSSOCIfltpH With CPrnrp PAntoinarc" vir/vn1i4 ka 

indefinite. 

- if "said secure containers" is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 



PAGE 42 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" is indefinite. 


protected." 

- if "protected processing environment" is not at least 
limited to excluding the processor and "memory" recited 
earlier in the claim, and is not at least limited to 
executing software and/or hardware (if any) expressly 
disclosed in the specification and identified as a 
"protected processing environment," the term "protected 
processing environment" would be indefinite. 

- if "protecting" is not at least limited to preventing 
unauthorized "user" processing of a particular item on a 
per item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
"objects" (and their content at an arbitrary granular 
level), and specific "users," the term "protecting" would 
be indefinite. 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "protecting." 

- "information contained in said protected processing 
environment" is indefinite, e.g., on what aspects of a 


a protected processing 
environment at least in part 
protecting information 
contained in said protected 
processing environment from 
tampering by a user of said 
first apparatus, 


- "protected" is indefinite. It is an amorphous term 
that the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "protected" from "not 


PAGE 43 . MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


"protected processing environment" can "contain" 
information, and on whether "contain" encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 

- "protecting from . . . tampering" is indefinite, e.g., on 
the specific threat(s) being addressed and on the level(s) 
and nature of protection from those threats. 

- "a user of said first apparatus" is indefinite, e.g., on 
whether "a user" means "any user" or a particular "user." 


said protected processing 
environment including 
hardware or software used for 


applying said first rule and a 
secure container rule in 
combination to at least in part 


govern at least one aspect of 
access to or use of a governed 
item: and 


see above 

- "said first rule and a secure container rule" is 
indefinite, e.g., on whether "a secure container rule" is 
separate from a "first rule," and on what distinguishes a 
single "rule" from two separate "rules." 

- "hardware or software used for applying ... in a 
secure container," is indefinite, e.g., on the structure of 
this "hardware or software." The specification does not 
disclose adequate corresponding structure. 

- "applying ... in combination" is indefinite, e.g., on 
the manner in which the "rules" are merged and applied. 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "govern." 

- if "govern" is not at least limited to preventing 
unapproved user processing of a particular item on a per 
item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 

handcuffs" between specific "controls," specific 
objects" (and their content at an arbitrary granular 


PAGE 44 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


# 



level), and specific "users," the term "govern" would be 
indefinite. 

- "access" is indefinite, e.g., on whether it 
encompasses or excludes determining the information 
content of what is accessed (e.g., decrypting any 
encrypted information). 

- "use" is indefinite and is used inconsistently in the 
allegedly incorporated specification, e.g., on whether or 
not it encompasses or excludes "distribution," 
"extraction," "manipulating," and/or "copying." 

- "an aspect of access to or use of is indefinite. 

- "a governed item" is indefinite and has no or an 
indefinite antecedent. 

hardware or software used for 

- see above 

- "hardware or software used for transmission ... or for 
the receipt ... from other apparatuses" is indefinite, e.g., 
on the structure of this "hardware or software," on its 
relationship, if any, with the previously recited 
"hardware or software used for receiving and opening 
secure containers," on whether the same "hardware or 
software" performs both, and on its relationship, if any, 
with any other element recited in the claim. The 
specification does not disclose adequate corresponding 
Suuciure. 

transmission of secure 

containers to other 

apparatuses or for the receipt 

of secure containers from other 

apparatuses: and 


a sccuiiu apparatus including, 

the claim is indefinite on which of the recited 
elements are mciuoea in tne second apparatus. 

uic i/idim ib muciiruic ior railing to iinx tne lirst 
apparatus with the second apparatus in any manner. 

user controls, 

- "user controls" is indefinite. 

a communications port, 


a processor, 


a memory containing a second 

- "memory" is indefinite, e.g., on whether it 


PAGE 45 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


rule, 

encompasses or excludes storage that is not directly 
addressable by the processor. 

- "containing" is indefinite and used inconsistently in 
at least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "containing." 

- "rule" is indefinite and is used inconsistently in the 
specification. For example, it is indefinite on what 
distinguishes a single "rule" from two separate "rules." 

hardware or software used for 

- see above 

- "receiving" is indefinite, e.g., on what processing, if 
any, is required to complete this "receiving" step, on 
what receives the "secure containers," and on what or 
where they are received from. 

- if "opening secure containers" is not at least limited 
to successful completion of the "OPEN method" 
expressly disclosed in the allegedly incorporated 
specification, the phrase "opening secure containers" 
would be indefinite. 

- "secure container" is indefinite, e.g., on its structure 
and certain of its functions, and on whether it 
encompasses or excludes "virtual container." The 
specification does not disclose adequate corresponding 
structure under Section 1 12, 1J 6. 

- "secure" is indefinite. It is an amorphous term that 
the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 

receiving and opening secure 

containers. 


PAGE 46 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




those threats that separate(s) "secure" from "not secure." 
- "hardware or software used for receiving and opening 
secure containers," is indefinite, e.g., on the structure of 
this "hardware or software," and on whether the same 
hardware or software performs both "receiving" and 
"opening." The specification does not disclose adequate 
corresponding structure. 

said secure containers each 
including the capacity to 
contain a governed item, 

see above 

- if "said secure containers" is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 
to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" would be 
indefinite. 

- "contain" is indefinite and used inconsistently in at 
least the allegedly incorporated specification. For 
example, it is indefinite on whether it encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 

- "a governed item," is indefinite, e.g., on what 
distinguishes "a governed item" from two separate 
governed items. 

- "including the capacity to contain a governed item" is 
indefinite. 

a secure container rule being 
associated with each of said 
secure containers: 

- see above 

- if "associated with ... secure containers" is not at least 
limited to use of the disclosed component assembly, 
"secure container," "protected processing environment," 
"object registration," and other mechanisms of the 
purported "VDE" "invention" for allegedly individually 
ensuring the "access control" "handcuffs" between 



PAGE 47 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 




specific "controls," specific "objects" (and their content 
at an arbitrary granular level), and specific "users," the 
phrase "associated with . . . secure containers" would be 
indefinite. 

- if "said secure containers" is not at least limited to all 
"secure containers" which the "hardware or software 
used for receiving and opening secure containers" is able 
to "receive and open" (regardless of whether it has done 
so), the phrase "said secure containers" is indefinite. 

a protected processing 
environment at least in part 
protecting information 
contained in said protected 
processing environment from 
tampering by a user of said 
apparatus, 

- "protected" is indefinite. It is an amorphous term 
that the specification both fails to define and uses 
inconsistently. For example, it is indefinite on what sort 
of threat(s) is (are) being addressed (e.g., confidentiality? 
integrity? authentication? non-repudiation? availability?) 
and on the nature and the level(s) of protection from 
those threats that separate(s) "protected" from "not 
protected." 

- if "protected processing environment" is not at least 
limited to excluding the processor and "memory" recited 
earlier in the claim, and is not at least limited to 
executing software and/or hardware (if any) expressly 
disclosed in the specification and identified as a 
"protected processing environment," the term "protected 
processing environment" would be indefinite. 

- if "protecting" is not at least limited to preventing 
unauthorized "user" processing of a particular item on a 
per item basis by use of the disclosed "component 
assembly, secure container, protected processmg 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 


PAGE 48 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



"objects" (and their content at an arbitrary granular 
level), and specific "users," the term "protecting" would 
be indefinite. 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "protecting." 

- "information contained in said protected processing 
environment" is indefinite, e.g., on what aspects of a 
"protected processing environment" can "contain" 
information, and on whether "contain" encompasses or 
excludes merely holding a reference, and, if it does 
encompass merely holding a reference, what type of 
reference suffices to constitute "contain." 

- "protecting from . . . tampering" is indefinite, e.g., on 
the specific threat(s) being addressed and on the level(s) 
and nature of protection from those threats. 

- "a user of said apparatus" is indefinite, e.g., on 
whether "a user" means "any user" or a particular "user," 
and on whether "said apparatus" is the first or second 
apparatus. 

said protected processing 
environment including 
hardware or software used for 
applvine said second rule and a 

- see above 

- "said second rule and a secure container rule" is 
indefinite, e.g., on what distinguishes a single "rule" 
from two separate "rules." 

- "hardware or software used for applying ... in a 
secure container," is indefinite, e.g., on the structure of 
this "hardware or software." The specification does not 
disclose adequate corresponding structure. 

- "applying ... in combination" is indefinite, e.g., on 
the manner in which the rules are merged and applied. 

- "at least in part" is indefinite, and, under some 
possible meanings, inconsistent with "govern." 

- if "govern" is not at least limited to preventing 

secure container rule in 
combination to at least in Dart 

govern at least one aspect of 
access to or use of a governed 
item; and 


PAGE 49 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


unauthorized "user" processing of a particular item on a 
per item basis by use of the disclosed "component 
assembly," "secure container," "protected processing 
environment," "object registration," and other 
mechanisms of the purported "VDE" "invention" for 
allegedly individually ensuring the "access control" 
"handcuffs" between specific "controls," specific 
"objects" (and their content at an arbitrary granular 
level), and specific "users," the term "govern" would be 
indefinite. 

- "access" is indefinite, e.g., on whether it 
encompasses or excludes determining the information 
content of what is "accessed" (e.g., decrypting any 
encrypted information). 

- "use" is indefinite and is used inconsistently in the 
allegedly incorporated specification, e.g., on whether or 
not it encompasses or excludes "distribution," 
"extraction," "manipulating," and/or "copying." 

- "an aspect of access to or use of is indefinite. 

- "a governed item" is indefinite and has no or an 
indefinite antecedent. 


hardware or software used for 
transmission of secure 
containers to other 
apparatuses or for the receipt 


of secure containers from other 
apparatuses : and 


see above 

- "hardware or software used for transmission ... or for 
the receipt ... from other apparatuses" is indefinite, e.g., 
on the structure of this "hardware or software," and on its 
relationship, if any, with the previously recited 
"hardware or software used for receiving and opening 
secure containers," and on its relationship, if any, with 
any other element recited in the claim. The specification 
does not disclose adequate corresponding structure. 


an electronic intermediary , said 
intermediary including a user 


see above 

"electronic intermediary" is indefinite, e.g., as to the 


PAGE 50 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



nature of its structure and function, and its relationship, if 
any, to either the first apparatus or the second apparatus, 
or to any other element of the claim, and on whether it 
encompasses or excludes a "virtual intermediary" or 
"virtual go-between." The specification does not 
disclose adequate corresponding structure. 

- "rights" is indefinite. 

- "user rights authority clearinghouse" is indefinite, 
e.g., as to the nature of its structure and function, and its 
relationship, if any, to either the first apparatus or the 
second apparatus, or to any other element of the claim. 
The specification does not disclose adequate 
corresponding structure. 


29. A system as in claim 28, said user rights authority clearinghouse operatively connected to 
make rights available to users. 


Following are some examples of the additional ways in which this dependent claim and 
these claim terms and phrases are indefinite on the face of the patent and/or as apparently 
construed by InterTrust: 


A system as in claim 28, said user 

- see above 

rights authority clearinghouse 

- "operatively connected" is indefinite, e.g., as to what 

operatively connected to make 

it is connected. 

rights available to users. 

- "to make rights available to users" is indefinite, e.g., 


on which "users" it addresses and what it means for 


"rights" to be "available" to those "users." 


Enablement and Written Description 

Invalidity of the Asserted InterTrust Patent Claims 


Each of the asserted InterTrust patent claims is invalid for violating the written description 
and enablement requirements of 35 U.S.C. § 1 12, H 1, particularly as the claims are construed in 
the untenable manner apparently underlying InterTrust's infringement accusations in this action. 

PAGE 51 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


One way in which the claims of the £ 193 patent and the '683 patent (including but not 
limited to the extent the allegedly incorporated applications are considered) are not enabled is that 
the applications from which they issued are so rambling, unfocused, vague and internally 
inconsistent that they obfuscated any alleged teaching of the claimed subject matter and failed to 
enable one of skill in the art, without undue experimentation, to follow any alleged directions of 
the application to carry out the claimed subject matter. 

The claims are invalid for violating the written description requirement to the extent that 
they are construed so as to contradict and/or not require the essential, non-optional alleged 
attributes of the alleged "invention" that were identified in the application (as originally filed, 
disregarding all new matter) from which the claims issued. Those disclosed "invention" defining 
statements include descriptions of the "present invention" and/or "VDE" or "virtual distribution 
environment," statements distinguishing prior techniques or products, such statements in the 
Summary of the Invention or Objects of the Invention sections of the application, and non- 
optional attributes shared by the disclosed embodiments and/or initial application claims. They 
include, but are not limited to, such alleged attributes reflected in the below-listed exemplary 
statements in the applications filed on December 9, 1998 (the '193 Patent), December 28, 1998 
(the '683 Patent), and/or similar statements in the patents' Patent Office prosecution histories 
and/or any properly incorporated patent(s) or patent application(s), if any. 

The claims are further invalid under the enablement requirement as the applications did 
not enable those of skill in the art to build systems having these touted attributes, at least not 
without an unreasonable amount of experimentation. 

• "The present invention provides a new kind of "virtual distribution environment" (called 
"VDE" in this document) that secures, administers, and audits electronic information use. VDE 
also features fundamentally important capabilities for managing content that travels "across" the 
"information highway." These capabilities comprise a rights protection solution that serves all 
electronic community members. These members include content creators and distributors, 
financial service providers, end-users, and others. VDE is the first general purpose, configurable, 
transaction control/rights protection solution for users of computers, other electronic appliances, 
networks, and the information highway." 

• "The inability of conventional products to be shaped to the needs of electronic information 
providers and users is sharply in contrast to the present invention. Despite the attention devoted 

PAGE 52 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


by a cross-section of America's largest telecommunications, computer, entertainment and 
information provider companies to some of the problems addressed by the present invention, only 
the present invention provides commercially secure, effective solutions for configurable, general 
purpose electronic commerce transaction/distribution control systems." 

• "VDE may be used to provide basic usage control in several ways. First, it permits the 
"embedding" of multiple containers within a single object. Embedded objects permit the 
"nesting" of control structures within a container. VDE also extends usage control information to 
an arbitrary granular level (as opposed to a file based level provided by traditional operating 
systems) and provides flexible control information over any action associated with the 
information which can be described as a VDE controlled process." 

• "Providers of "electronic currency" have also created protections for their type of content. 
These systems are not sufficiently adaptable, efficient, nor flexible enough to support the 
generalized use of electronic currency. Furthermore, they do not provide sophisticated auditing 
and control configuration capabilities. This means that current electronic currency tools lack the 
sophistication needed for many real- world financial business models. VDE provides means for 
anonymous currency and for "conditionally" anonymous currency, wherein currency related 
activities remain anonymous except under special circumstances." 

• "Traditional content control mechanisms often require users to purchase more electronic 
information than the user needs or desires. For example, infrequent users of shrink-wrapped 
software are required to purchase a program at the same price as frequent users, even though they 
may receive much less value from their less frequent use. Traditional systems do not scale cost 
according to the extent or character of usage and traditional systems can not attract potential 
customers who find that a fixed price is too high. Systems using traditional mechanisms are also 
not normally particularly secure. For example, shrink-wrapping does not prevent the constant 
illegal pirating of software once removed from either its physical or electronic package." 

• "Traditional electronic information rights protection systems are often inflexible and 
inefficient and may cause a content provider to choose costly distribution channels that increase a 
product's price. In general these mechanisms restrict product pricing, configuration, and 
marketing flexibility. These compromises are the result of techniques for controlling information 
which cannot accommodate both different content models and content models which reflect the 
many, varied requirements, such as content delivery strategies, of the model participants. This can 

PAGE 53- MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING US PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


limit a provider's ability to deliver sufficient overall value to justify a given product's cost in the 
eyes of many potential users. VDE allows content providers and distributors to create applications 
and distribution networks that reflect content providers 1 and users' preferred business models. It 
offers users a uniquely cost effective and feature rich system that supports the ways providers 
want to distribute information and the ways users want to use such information." 

• "VDE provides important enhancements for improving data security in organizations by 
providing "smart" transaction management features that can be far more effective than key and 
password based "go/no go" technology." 

• "A variety of capabilities are required to implement an electronic commerce environment. 
VDE is the first system that provides many of these capabilities and therefore solves fundamental 
problems related to electronic dissemination of information." 

• "The scalable transaction management/auditing technology of the present invention will result 
in more efficient and reliable interoperability amongst devices functioning in electronic 
commerce and/or data security environments." 

• "Templates, classes (including user groups employing an object under group access), and 
flexible control structures including object "independent" permissions records (permissions that 
can be associated with a plurality of objects) and structures that support budgeting and auditing as 
separate VDE processes, help focus the flexible and configurable capabilities inherent within 
authoring provided by the present invention in the context of specific industries and/or businesses 
and/or applications. ... The VDE templates, classes, and control structures are inherently flexible 
and configurable to reflect the breadth of information distribution and secure storage 
requirements, ... the present invention truly achieves a content control and auditing architecture 
that can be configured to most any commercial distribution embodiment." 

• "The design of the VDE foundation, VDE load modules, and VDE containers, are important 
features that enable the VDE node operating environment to be compatible with a very broad 
range of electronic appliances." 

• "Each logical object structure 800 may also include a "private body" 806 containing or 
referencing a set of methods 1000 (i.e., programs or procedures) that control use and distribution 
of the object 300. The ability to optionally incorporate different methods 1000 with each object is 
important to making VDE 100 highly configurable." 

PAGE 54 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


• "A significant facet of the present invention's ability to broadly support electronic commerce 
is its ability to securely manage independently delivered VDE component objects containing 
control information (normally in the form of VDE objects containing one or more methods, data, 
or load module VDE components). This independently delivered control information can be 
integrated with senior and other pre-existing content control information to securely form derived 
control information using the negotiation mechanisms of the present invention. All requirements 
specified by this derived control information must be satisfied before VDE controlled content can 
be accessed or otherwise used. This means that, for example, all load modules and any mediating 
data which are listed by the derived control information as required must be available and 
securely perform their required function." 

• "A significant feature of VDE accommodates the many, varying distribution and other 
transaction variables by, in part, decomposing electronic commerce and data security functions 
into generalized capability modules executable within a secure hardware SPU and/or 
corresponding software subsystem and further allowing extensive flexibility in assembling, 
modifying, and/or replacing, such modules (e.g. load modules and/or methods) in applications run 
on a VDE installation foundation. This configurability and reconfigurability allows electronic 
commerce and data security participants to reflect their priorities and requirements through a 
process of iteratively shaping an evolving extended electronic agreement (electronic control 
model). This shaping can occur as content control information passes from one VDE participant 
to another and to the extent allowed by "in place" content control information. This process 
allows users of VDE to recast existing control information and/or add new control information as 
necessary (including the elimination of no longer required elements)." 

• "VDE's fundamental configurability will allow a broad range of competitive electronic 
commerce business models to flourish." 

• "Adding new content to objects is an important aspect of authoring provided by the present 
invention. Providers may wish to allow one or more users to add, hide, modify, remove and/or 
extend content that they provide. In this way, other users may add value to, alter for a new 
purpose, maintain, and/or otherwise change, existing content. The ability to add content to an 
empty and/or newly created object is important as well." 

• "Importantly, VDE securely and flexibly supports editing the content in, extracting content 
from, embedding content into, and otherwise shaping the content composition of, VDE content 

PAGE 55 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253 , 1 93 & 6, 1 85,683 PURSUANT TO PLR 3-3,3-4 


containers. Such capabilities allow VDE supported product models to evolve by progressively 
reflecting the requirements of "next" participants in an electronic commercial model." 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (a) integration into the fundamental control environment of a broad range of electronic 
appliances through portable API and programming language tools that efficiently support 
merging of control and auditing capabilities in nearly any electronic appliance environment while 
maintaining overall system security;" 

• "Taken together, and employed at times with VDE administrative objects and VDE security 
arrangements and processes, the present invention truly achieves a content control and auditing 
architecture that can be configured to most any commercial distribution embodiment." 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (c) generic content model;" 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (b) modular data structures;" 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (d) general modularity and independence of foundation architectural components;" 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (e) modular security structures;" 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (f) variable length and multiple branching chains of control; and" 

• "Some of the key factors contributing to the configurability intrinsic to the present invention 
include: (g) independent, modular control structures in the form of executable load modules that 
can be maintained in one or more libraries, and assembled into control methods and models, and 
where such model control schemes can "evolve" as control information passes through the VDE 
installations of participants of a pathway of VDE content control information handling." 

• "An important feature of VDE is that it can be used to assure the administration of, and 
adequacy of security and rights protection for, electronic agreements implemented through the 
use of the present invention." 


PAGE 56- MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING US PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, VDE includes features that: ... "sufficiently" 
impede unauthorized and/or uncompensated use of electronic information and/or appliances 
through the use of secure communication, storage, and transaction management technologies ...." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, ... support low-cost, efficient, and effective 
security architectures for transaction control, auditing, reporting, and related communications and 
information storage 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, ... support dynamic user selection of 
information subsets of a VDE electronic information product (VDE controlled content). This 
contrasts with the constraints of having to use a few high level individual, pre-defined content 
provider information increments such as being required to select a whole information product or 
product section in order to acquire or otherwise use a portion of such product or section." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, ... securely store at a user's site potentially 
highly detailed information reflective of a user's usage of a variety of different content segment 
types... support trusted chain of handling capabilities for pathways of distributed electronic 
information and/or for content usage related information." 

PAGE 57 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . support flexible auditing mechanisms, 
such as employing "bitmap meters, ..." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . support "launchable" content, that is 
content that can be provided by a content provider to an end-user, who can then copy or pass 
along the content to other end-user parties without requiring the direct participation of a content 
provider to register and/or otherwise initialize the content for use 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . securely support electronic currency and 
credit usage control, storage, and communication at, and between, VDE installations." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . provide smart object agents that can carry 
requests, data, and/or methods, including budgets, authorizations, credit or currency, and content. 

. . . Smart objects can, for example, be transmitted to a remote location to perform a specified 
database search on behalf of a user . . . ." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 

PAGE 58 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . "employ "templates" to ease the process 
of configuring capabilities of the present invention as they relate to specific industries or 
businesses. .. .Given the very large range of capabilities and configurations supported by the 
present invention, reducing the range of configuration opportunities to a manageable subset 
particularly appropriate for a given business model allows the full configurable power of the 
present invention to be easily employed by "typical" users who would be otherwise burdened 
with complex programming and/or configuration design responsibilities template applications can 
also help ensure that VDE related processes are secure and optimally bug free by reducing the 
risks associated with the contribution of independently developed load modules, including 
unpredictable aspects of code interaction between independent modules and applications, as well 
as security risks associated with possible presence of viruses in such modules. ... As the context 
surrounding these templates changes or evolves, template applications provided under the present 
invention may be modified to meet these changes for broad use, or for more focused activities. 
Of course, templates may, under certain circumstances have fixed control information and not 
provide for user selections or parameter data entry." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . provide mechanisms to persistently 
maintain trusted content usage and reporting control information through both a sufficiently 
secure chain of handling of content and content control information and through various forms of 
usage of such content wherein said persistence of control may survive such use. Persistence of 
control includes the ability to extract information from a VDE container object by creating a new 
container whose contents are at least in part secured and that contains both the extracted content 
and at least a portion of the control information which control information of the original 
container and/or are at least in part produced by control information of the original container for 
this purpose and/or VDE installation control information stipulates should persist and/or control 
usage of content in the newly formed container. Such control information can continue to manage 
usage of container content if the container is "embedded" into another VDE managed object, such 

PAGE 59 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U S PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


as an object which contains plural embedded VDE containers, each of which contains content 
derived (extracted) from a different source." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . enables users ... to specify preferences or 
requirements related to their use of electronic content and/or appliances. Content users, such as 
end-user customers using commercially distributed content ... can define, if allowed by senior 
control information, budgets, and/or other control information, to manage their own internal use 
of content. Uses include, for example, a user setting a limit on the price for electronic documents 
that the user is willing to pay without prior express user authorization, and the user establishing 
the character of metering information he or she is willing to allow to be collected (privacy 
protection)." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . provide mechanisms that allow control 
information to "evolve" and be modified according, at least in part, to independently, securely 
delivered further control information. ... Handlers in a pathway of handling of content control 
information, to the extent each is authorized, can establish, modify, and/or contribute to, 
permission, auditing, payment, and reporting control information related to controlling, analyzing, 
paying for, and/or reporting usage of, electronic content and/or appliances (for example, as 
related to usage of VDE controlled property content)." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . support multiple simultaneous control 
models for the same content property and/or property portion. This allows, for example, for 

PAGE 60 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



concurrent business activities which are dependent on electronic commercial product content 
distribution, such as acquiring detailed market survey information and/or supporting advertising, 
both of which can increase revenue and result in lower content costs to users and greater value to 
content providers." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, ... enable a user to securely extract, through 
the use of the secure subsystem at the user's VDE installation, at least a portion of the content 
included within a VDE content container to produce a new, secure object (content container), 
such that the extracted information is maintained in a continually secure manner through the 
extraction process." 

• "it is important to provide a framework of operation and/or structure to allow existing 
industries and/or applications and/or businesses to manipulate familiar concepts related to content 
types, distribution approaches, pricing mechanisms, user interactions with content and/or related 
administrative activities, budgets, and the like." 

• "The present invention allows content providers and users to formulate their transaction 
environment to accommodate: 

- (1) desired content models, content control models, and content usage information pathways, 

- (2) a complete range of electronic media and distribution means, 

- (3) a broad range of pricing, payment, and auditing strategies, 

- (4) very flexible privacy and/or reporting models, 

- (5) practical and effective security architectures, and 

- (6) other administrative procedures that together with steps (1) through (5) can enable most 
"real world" electronic commerce and data security models, including models unique to the 
electronic world." 

• "This ability of the present invention to support multiple pathway branches for the flow of 
both VDE content control information and VDE managed content enables an electronic 


PAGE 61 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


commerce marketplace which supports diverging, competitive business partnerships, agreements, 
and evolving overall business models which can employ the same content properties combined, 
for example, in differing collections of content representing differing at least in part competitive 
products." 

• "the present invention can help ensure, for example, that parties, will be paid for use of 
distributed information in a manner consistent with their agreement; ... the present invention can, 
for example, help ensure that data is used only in authorized ways; 

• "The VDE templates, classes, and control structures are inherently flexible and configurable 
to reflect the breadth of information distribution and secure storage requirements, to allow for 
efficient adaptation into new industries as they evolve, and to reflect the evolution and/or change 
of an existing industry and/or business, as well as to support one or more groups of users who 
may be associated with certain permissions and/or budgets and object types. The flexibility of 
VDE templates, classes, and basic control structures is enhanced through the use of VDE 
aggregate and control methods which have a compound, conditional process impact on object 
control. Taken together, and employed at times with VDE administrative objects and VDE 
security arrangements and processes, the present invention truly achieves a content control and 
auditing architecture that can be configured to most any commercial distribution embodiment. 
Thus, the present invention fully supports the requirements and biases of content providers 
without forcing them to fit a predefined application model. It allows them to define the rights, 
control information, and flow of their content (and the return of audit information) through 
distribution channels." 

• "a creator . . . may allow changes by an auditor for event trails, but not allow anyone but 
themselves to read those trails ..." 

• "Since all secure communications are at least in part encrypted and the processing inside the 
secure subsystem is concealed from outside observation and interference, the present invention 
ensures that content control information can be enforced. As a result, the creator and/or 
distributor and/or client administrator and/or other contributor of secure control information for 
each property (for example, an end-user restricting the kind of audit information he or she will 
allow to be reported and/or a financial clearinghouse establishing certain criteria for use of its 
credit for payment for use of distributed content) can be confident that their contributed and 

PAGE 62 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


accepted control information will be enforced (within the security limitations of a given VDE 
security implementation design)." 

• "Since different groups of components can be put together for different applications, the 
present invention can provide electronic control information for a wide variety of different 
products and markets. This means the present invention can provide a "unified," efficient, secure, 
and cost-effective system for electronic commerce and data security. This allows VDE to serve as 
a single standard for electronic rights protection, data security, and electronic currency and 
banking." 

• "In a VDE, the separation between a rights application and its foundation permits the efficient 
selection of sets of control information that are appropriate for each of many different types of 
applications and uses." 

• "Due to its open design, VDE allows (normally under securely controlled circumstances) 
applications using technology independently created by users to be "added" to the system and 
used in conjunction with the foundation of the invention." 

• "In sum, the present invention allows information contained in electronic information 
products to be supplied according to user specification. Tailoring to user specification allows the 
present invention to provide the greatest value to users, which in turn will generate the greatest 
amount of electronic commerce activity." 

• "VDE permits multiple, separate electronic arrangements to be formed between subsets of 
parties in a VDE supported electronic value chain model. These multiple agreements together 
comprise a VDE value chain "extended" agreement. VDE allows such constituent electronic 
agreements, and therefore overall VDE extended agreements, to evolve and reshape over time as 
additional VDE participants become involved in VDE content and/or appliance control 
information handling. VDE electronic agreements may also be extended as new control 
information is submitted by existing participants. With VDE, electronic commerce participants 
are free to structure and restructure their electronic commerce business activities and 
relationships. As a result, the present invention allows a competitive electronic commerce 
marketplace to develop since the use of VDE enables different, widely varying business models 
using the same or shared content." 


PAGE 63 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


• "A feature of the present invention enables such flexibility of metering control mechanisms to 
accommodate a simultaneous, broad array of: (a) different parameters related to electronic 
information content use; (b) different increment units (bytes, documents, properties, paragraphs, 
images, etc.) and/or other organizations of such electronic content; and/or (c) different categories 
of user and/or VDE installation types, such as client organizations, departments, projects, 
networks, and/or individual users, etc. This feature of the present invention can be employed for 

• "A feature of the present invention provides for payment means supporting flexible electronic 
currency and credit mechanisms, including the ability to securely maintain audit trails reflecting 
information related to use of such currency or credit." 

• "Features of the present invention help ensure that a requirement that a clearinghouse report 
such usage information and payment content will be observed." 

• "A feature of the present invention is the use of portable VDEs as transaction cards at retail 
and other establishments, wherein such cards can "dock" with an establishment terminal that has a 
VDE secure sub-system and/or an online connection to a VDE secure and/or otherwise secure and 
compatible subsystem, such as a "trusted" financial clearinghouse (e.g., VISA, Mastercard)." 

• "A feature of VDE provided by the present invention is that certain one or more methods can 
be specified as required in order for a VDE installation and/or user to be able to use certain and/or 
all content. For example, a distributor of a certain type of content might be allowed by "senior" 
participants (by content creators, for example) to require a method which prohibits end-users 
from electronically saving decrypted content, a provider of credit for VDE transactions might 
require an audit method that records the time of an electronic purchase, and/or a user might 
require a method that summarizes usage information for reporting to a clearinghouse (e.g. billing 
information) in a way that does not convey confidential, personal information regarding detailed 
usage behavior. A further feature of VDE provided by the present invention is that creators, 
distributors, and users of content can select from among a set of predefined methods (if available) 
to control container content usage and distribution functions and/or they may have the right to 
provide new customized methods to control at least certain usage functions (such "new" methods 
may be required to be certified for trustedness and interoperability to the VDE installation and/or 
for of a group of VDE applications). As a result, VDE provides a very high degree of 


PAGE 64 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


configurability with respect to how the distribution and other usage of each property or object (or 
one or more portions of objects or properties as desired and/or applicable) will be controlled." 

• "the present invention's trusted/secure, universe wide, distributed transaction control and 
administration system." 

• "The configurability provided by the present invention is particularly critical for supporting 
electronic commerce, that is enabling businesses to create relationships and evolve strategies that 
offer competitive value. Electronic commerce tools that are not inherently configurable and 
interoperable will ultimately fail to produce products (and services) that meet both basic 
requirements and evolving needs of most commerce applications." 

• "Templates, classes (including user groups employing an object under group access), and 
flexible control structures including object "independent" permissions records (permissions that 
can be associated with a plurality of objects) and structures that support budgeting and auditing as 
separate VDE processes, help focus the flexible and configurable capabilities inherent within 
authoring provided by the present invention in the context of specific industries and/or businesses 
and/or applications. ... The VDE templates, classes, and control structures are inherently flexible 
and configurable to reflect the breadth of information distribution and secure storage 
requirements, ... the present invention truly achieves a content control and auditing architecture 
that can be configured to most any commercial distribution embodiment." 

• "As with the content control information for most VDE managed content, features of the 
present invention allows [sic] the content's control information to: (a) "evolve," for example, the 
extractor of content may add new control methods and/or modify control parameter data, such as 
VDE application compliant methods, to the extent allowed by the content's in-place control 
information. .. . (b) allow a user to combine additional content with at least a portion of said 
extracted content, . (c) allow a user to securely edit at least a portion of said content while 
maintaining said content in a secure form within said VDE content container; . (d) append 
extracted content to a pre-existing VDE content container object and attach associated control 
information . . . (e) preserve VDE control over one or more portions of extracted content after 
various forms of usage of said portions ... Generally, the extraction features of the present 
invention allow users to aggregate and/or disseminate and/or otherwise use protected electronic 
content information extracted from content container sources while maintaining secure VDE 


PAGE 65 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


capabilities thus preserving the rights of providers in said content information after various 
content usage processes." 

• "For example, features of the present invention include: (a) VDE system software to in part 
extend and/or modify host operating systems such that they possesses VDE capabilities, such as 
enabling secure transaction processing and electronic information storage; (b) one or more 
application programs that in part represent tools associated with VDE operation; and/or (c) code 
to be integrated into application programs, wherein such code incorporates references into VDE 
system software to integrate VDE capabilities and makes such applications VDE aware 

• "The distribution control information provided by the present invention allow flexible positive 
control. No provider is required to include any particular control, or use any particular strategy, 
except as required by senior control information. Rather, the present invention allows a provider 
to select from generic control components (which may be provided as a subset of components 
appropriate to a provider's specific market, for example, as included in and/or directly compatible 
with, a VDE application) to establish a structure appropriate for a given chain of 
handling/control." 

• "In part, security is enhanced by object methods employed by the present invention because 
the encryption schemes used to protect an object can efficiently be further used to protect the 
associated content control information (software control information and relevant data) from 
modification." 

• "Control methods are created primarily through the use of one or more of said executable, 
reusable load module code pieces (normally in the form of executable object components) and 
associated data. The component nature of control methods allows the present invention to 
efficiently operate as a highly configurable content control system. Under the present invention, 
content control models can be iteratively and asynchronously shaped, and otherwise updated to 
accommodate the needs of VDE participants to the extent that such shaping and otherwise 
updating conforms to constraints applied by a VDE application, if any (e.g., whether new 
component assemblies are accepted and, if so, what certification requirements exist for such 
component assemblies or whether any or certain participants may shape any or certain control 
information by selection amongst optional control information (permissions record) control 
methods. This iterative (or concurrent) multiple participant process occurs as a result of the 


PAGE 66 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


submission and use of secure, control information components (executable code such as load 
modules and/or methods, and/or associated data)." 

• "The special purpose secure circuitry provided by the present invention includes at least one 
of: a dedicated semiconductor arrangement known as a Secure Processing Unit (SPU) and/or a 
standard microprocessor, microcontroller, and/or other processing logic that accommodates the 
requirements of the present invention and functions as an SPU." 

• "VDE offers an architecture that avoids reflecting specific distribution biases, administrative 
and control perspectives, and content types. Instead, VDE provides a broad-spectrum, 
fundamentally configurable and portable, electronic transaction control, distributing, usage, 
auditing, reporting, and payment operating environment. VDE is not limited to being an 
application or application specific toolset that covers only a limited subset of electronic 
interaction activities and participants. Rather, VDE supports systems by which such applications 
can be created, modified, and/or reused. As a result, the present invention answers pressing, 
unsolved needs by offering a system that supports a standardized control environment which 
facilitates interoperability of electronic appliances, interoperability of content containers, and 
efficient creation of electronic commerce applications and models through the use of a 
programmable, secure electronic transactions management foundation and reusable and 
extensible executable components. VDE can support a single electronic "world" within which 
most forms of electronic transaction activities can be managed." 

• "A fundamental problem for electronic content providers is extending their ability to control 
the use of proprietary information. Content providers often need to limit use to authorized 
activities and amounts. Participants in a business model involving, for example, provision of 
movies and advertising on optical discs may include actors, directors, script and other writers, 
musicians, studios, publishers, distributors, retailers, advertisers, credit card services, and content 
end-users. These participants need the ability to embody their range of agreements and 
requirements, including use limitations, into an "extended" agreement comprising an overall 
electronic business model. This extended agreement is represented by electronic content control 
information that can automatically enforce agreed upon rights and obligations. Under VDE, such 
an extended agreement may comprise an electronic contract involving all business model 
participants. Such an agreement may alternatively, or in addition, be made up of electronic 
agreements between subsets of the business model participants. Through the use of VDE, 

PAGE 67 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


electronic commerce can function in the same way as traditional commerce-that is commercial 
relationships regarding products and services can be shaped through the negotiation of one or 
more agreements between a variety of parties." 

• "VDE allows the owners and distributors of electronic digital information to reliably bill for, 
and securely control, audit, and budget the use of, electronic information. It can reliably detect 
and monitor the use of commercial information products." 

• "VDE provides comprehensive and configurable transaction management, metering and 
monitoring technology." 

• "Protecting the rights of electronic community members involves a broad range of 
technologies. VDE combines these technologies in a way that creates a "distributed" electronic 
rights protection "environment." This environment secures and protects transactions and other 
processes important for rights protection. VDE, for example, provides the ability to prevent, or 
impede, interference with and/or observation of, important rights related transactions and 
processes." 

• "VDE is a cost-effective and efficient rights protection solution that provides a unified, 
consistent system for securing and managing transaction processing. VDE can: (a) audit and 
analyze the use of content, (b) ensure that content is used only in authorized ways, and (c) allow 
information regarding content usage to be used only in ways approved by content users." 

• "VDE provides a unified solution that allows all content creators, providers, and users to 
employ the same electronic rights protection solution. . . . VDE can allow content to be exchanged 
"universally" and users of an implementation of the present invention can interact electronically 
without fear of incompatibilities in content control, violation of rights, or the need to get, install, 
or learn a new content control system." 

• "In addition, VDE: 

- (a) is very configurable, modifiable, and re-usable; 

- (b) supports a wide range of useful capabilities that may be combined in different ways to 
accommodate most potential applications; 

- (c) operates on a wide variety of electronic appliances ranging from hand-held inexpensive 
devices to large mainframe computers; 


PAGE 68 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


- (d) is able to ensure the various rights of a number of different parties, and a number of 
different rights protection schemes, simultaneously; 

- (e) is able to preserve the rights of parties through a series of transactions that may occur at 
different times and different locations; 

- (f) is able to flexibly accommodate different ways of securely delivering information and 
reporting usage; and 

- (g) provides for electronic analogues to "real" money and credit, including anonymous 
electronic cash, to pay for products and services and to support personal (including home) 
banking and other financial activities." 

• "Users of VDE will not require additional rights protection systems for different information 
highway products and rights problems-nor will they be required to install and learn a new system 
for each new information highway application. . . The content and control information supplied by 
one group can be used by people who normally use content and control information supplied by a 
different group. VDE can allow content to be exchanged "universally" and users of an 
implementation of the present invention can interact electronically without fear of 
incompatibilities in content control, violation of rights, or the need to get, install, or learn a new 
content control system." 

• "[VDE] can protect electronic rights including: (d) the privacy rights of users of content, 

• "Secure VDE hardware (also known as SPUs for Secure Processing Units), or VDE 
installations that use software to substitute for, or complement, said hardware (provided by Host 
Processing Environments (HPEs)), operate in conjunction with secure communications, systems 
integration software, and distributed software control information and support structures, to 
achieve the electronic contract/rights protection environment of the present invention. Together, 
these VDE components comprise a secure, virtual, distributed content and/or appliance control, 
auditing (and other administration), reporting, and payment environment. In some embodiments 
and where commercially acceptable, certain VDE participants, such as clearinghouses that 
normally maintain sufficiently physically secure non-VDE processing environments, may be 
allowed to employ HPEs rather VDE hardware elements and interoperate, for example, with VDE 
end-users and content providers." 


PAGE 69 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR3-3, 3-4 


• "VDE provides generalized configurability. This results, in part, from decomposition of 
generalized requirements for supporting electronic commerce and data security into a broad range 
of constituent "atomic" and higher level components (such as load modules, data elements, and 
methods) that may be variously aggregated together to form control methods for electronic 
commerce applications, commercial electronic agreements, and data security arrangements." 

• "VDE provides a secure operating environment employing VDE foundation elements along 
with secure independently deliverable VDE components that enable electronic commerce models 
and relationships to develop." 

• "VDE specifically supports the unfolding of distribution models in which content providers, 
over time, can expressly agree to, or allow, subsequent content providers and/or users to 
participate in shaping the control information for, and consequences of, use of electronic content 
and/or appliances. A very broad range of the functional attributes important for supporting simple 
to very complex electronic commerce and data security activities are supported by capabilities of 
the present invention. As a result, VDE supports most types of electronic information and/or 
appliance: usage control (including distribution), security, usage auditing, reporting, other 
administration, and payment arrangements." 

• "VDE supports a general purpose foundation for secure transaction management, including 
usage control, auditing, reporting, and/or payment. This general purpose foundation is called 
"VDE Functions" ("VDEFs"). VDE also supports a collection of "atomic" application elements 
(e.g., load modules) that can be selectively aggregated together to form various VDEF 
capabilities called control methods and which serve as VDEF applications and operating system 
functions." 

• "VDE provides organization, community, and/or universe wide secure environments whose 
integrity is assured by processes securely controlled in VDE participant user installations 
(nodes)." 

• "the end-to-end nature of VDE applications, in which content 108 flows in one direction, 
generating reports and bills 1 18 in the other, makes it possible to perform "back-end" consistency 
checks." 

• "VDE can protect a collection of rights belonging to various parties having in rights in, or to, 
electronic information. This information may be at one location or dispersed across (and/or 


PAGE 70 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


moving between) multiple locations. The information may pass through a "chain" of distributors 
and a "chain" of users. Usage information may also be reported through one or more "chains" of 
parties. In general, VDE enables parties that (a) have rights in electronic information, and/or (b) 
act as direct or indirect agents for parties who have rights in electronic information, to ensure that 
the moving, accessing, modifying, or otherwise using of information can be securely controlled 
by rules regarding how, when, where, and by whom such activities can be performed." 

• "VDE is a secure system for regulating electronic conduct and commerce. Regulation is 
ensured by control information put in place by one or more parties. These parties may include 
content providers, electronic hardware manufacturers, financial service providers, or electronic 
"infrastructure" companies such as cable or telecommunications companies." 

• "A rights application under VDE is made up of special purpose pieces, each of which can 
correspond to one or more basic electronic processes needed for a rights protection environment. 
These processes can be combined together like building blocks to create electronic agreements 
that can protect the rights, and may enforce fulfillment of the obligations, of electronic 
information users and providers. One or more providers of electronic information can easily 
combine selected building blocks to create a rights application that is unique to a specific content 
distribution model. A group of these pieces can represent the capabilities needed to fulfill the 
agreement(s) between users and providers. These pieces accommodate many requirements of 
electronic commerce including: the distribution of permissions to use electronic information; the 
persistence of the control information and sets of control information managing these 
permissions; configurable control set information that can be selected by users for use with such 
information; data security and usage auditing of electronic information; and a secure system for 
currency, compensation and debit management." 

• "VDE allows electronic arrangements to be created involving two or more parties. These 
agreements can themselves comprise a collection of agreements between participants in a 
commercial value chain and/or a data security chain model for handling, auditing, reporting, and 
payment. It can provide efficient, reusable, modifiable, and consistent means for secure electronic 
content: distribution, usage control, usage payment, usage auditing, and usage reporting." 

• "The features of VDE allow it to function as the first trusted electronic information control 
environment that can conform to, and support, the bulk of conventional electronic commerce and 
data security requirements. In particular, VDE enables the participants in a business value chain 


PAGE 71 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


model to create an electronic version of traditional business agreement terms and conditions and 
further enables these participants to shape and evolve their electronic commerce models as they 
believe appropriate to their business requirements." 

• "VDE provides the widely varying secure control and administration capabilities required for: 
1 . Different types of electronic content, 

- 2. Differing electronic content delivery schemes, 

- 3. Differing electronic content usage schemes, 

- 4. Different content usage platforms, and 

- 5. Differing content marketing and model strategies." 

• "VDE controls auditing and reporting of electronic content and/or appliance usage." 

• "VDE also securely supports the payment of money owed (including money owed for content 
and/or appliance usage) by one or more parties to one or more other parties, in the form of 
electronic credit and/or currency." 

• "VDE can securely manage the integration of control information provided by two or more 
parties. As a result, VDE can construct an electronic agreement between VDE participants that 
represent a "negotiation" between, the control requirements of, two or more parties and enacts 
terms and conditions of a resulting agreement. VDE ensures the rights of each party to an 
electronic agreement regarding a wide range of electronic activities related to electronic 
information and/or appliance usage." 

• "VDE does not require electronic content providers and users to modify their business 
practices and personal preferences to conform to a metering and control application program that 
supports limited, largely fixed finctionality. Furthermore, VDE permits participants to develop 
business models not feasible with non- electronic commerce, for example, involving detailed 
reporting of content usage information, large numbers of distinct transactions at hitherto 
infeasibly low price points, "pass-along" control information that is enforced without involvement 
or advance knowledge of the participants, etc." 

• "VDE can support "real" commerce in an electronic form, that is the progressive creation of 
commercial relationships that form, over time, a network of interrelated agreements representing 
a value chain business model. This is achieved in part by enabling content control information to 


PAGE 72 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


develop through the interaction of (negotiation between) securely created and independently 
submitted sets of content and/or appliance control information. Different sets of content and/or 
appliance control information can be submitted by different parties in an electronic business value 
chain enabled by the present invention. These parties create control information sets through the 
use of their respective VDE installations. Independently, securely deliverable, component based 
control information allows efficient interaction among control information sets supplied by 
different parties." 

• "Employing VDE as a general purpose electronic transaction/distribution control system 
allows users to maintain a single transaction management control arrangement on each of their 
computers, networks, communication nodes, and/or other electronic appliances. Such a general 
purpose system can serve the needs of many electronic transaction management applications 
without requiring distinct, different installations for different purposes. As a result, users of VDE 
can avoid the confusion and expense and other inefficiencies of different, limited purpose 
transaction control applications for each different content and/or business model. For example, 
VDE allows content creators to use the same VDE foundation control arrangement for both 
content authoring and for licensing content from other content creators for inclusion into their 
products or for other use. Clearinghouses, distributors, content creators, and other VDE users can 
all interact, both with the applications running on their VDE installations, and with each other, in 
an entirely consistent manner, using and reusing (largely transparently) the same distributed tools, 
mechanisms, and consistent user interfaces, regardless of the type of VDE activity." 

• "VDE prevents many forms of unauthorized use of electronic information, by controlling and 
auditing (and other administration of use) electronically stored and/or disseminated information." 

• "VDE can further be used to enable commercially provided electronic content to be made 
available to users in user defined portions, rather than constraining the user to use portions of 
content that were "predetermined" by a content creator and/or other provider for billing 
purposes." 

• "VDE supports a "universe wide" environment for electronic content delivery, broad 
dissemination, usage reporting, and usage related payment activities." 

• "VDE provides important mechanisms for both enforcing commercial agreements and 
enabling the protection of privacy rights. VDE can securely deliver information from one party to 
another concerning the use of commercially distributed electronic content. Even if parties are 

PAGE 73 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


separated by several "steps" in a chain (pathway) of handling for such content usage information, 
such information is protected by VDE through encryption and/or other secure processing. 
Because of that protection, the accuracy of such information is guaranteed by VDE, and the 
information can be trusted by all parties to whom it is delivered." 

• "VDE's security and metering secure subsystem core will be present at all physical locations 
where VDE related content is (a) assigned usage related control information (rules and mediating 
data), and/or (b) used. This core can perform security and auditing functions (including metering) 
that operate within a "virtual black box, " a collection of distributed, very secure VDE related 
hardware instances that are interconnected by secured information exchange (for example, 
telecommunication) processes and distributed database means." 

• "VDE supports multiple differing hierarchies of client organization control information 
wherein an organization client administrator distributes control information specifying the usage 
rights of departments, users, and/or projects." 

• "Since VDE capabilities can be seamlessly integrated as extensions, additions, and/or 
modifications to fundamental capabilities of electronic appliances and host operating systems, 
VDE containers, content control information, and the VDE foundation will be able to work with 
many device types and these device types will be able to consistently and efficiently interpret and 
enforce VDE control information." 

• "Summary of Some Important Features Provided by VDE in Accordance With the Present 
Invention: VDE employs a variety of capabilities that serve as a foundation for a general purpose, 
sufficiently secure distributed electronic commerce solution. VDE enables an electronic 
commerce marketplace that supports divergent, competitive business partnerships, agreements, 
and evolving overall business models. For example, . . . support, complete, modular separation of 
the control structures related to (1) content event triggering, (2) auditing, (3) budgeting (including 
specifying no right of use or unlimited right of use), (4) billing, and (5) user identity (VDE 
installation, client name, department, network, and/or user, etc.). . . . Without such separation 
between these basic VDE capabilities, it would be more difficult to efficiently maintain separate 
metering, budgeting, identification, and/or billing activities which involve the same, differing 
(including overlapping), or entirely different, portions of content fo'r metering, billing, budgeting, 
and user identification, for example, paying fees associated with usage of content, performing 
home banking, managing advertising services, etc. . . . VDE modular separation of these basic 


PAGE 74 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


capabilities supports the programming of plural, "arbitrary" relationships between one or differing 
content portions (and/or portion units) and budgeting, auditing, and/or billing control 
information." 

• "A feature of VDE provided by the present invention is that certain one or more methods can 
be specified as required in order for a VDE installation and/or user to be able to use certain and/or 
all content." 

• "A further feature of VDE provided by the present invention is that creators, distributors, and 
users of content can select from among a set of predefined methods (if available) to control 
container content usage and distribution functions and/or they may have the right to provide new 
customized methods to control at least certain usage functions (such "new" methods may be 
required to be certified for trustedness and interoperability to the VDE installation and/or for of a 
group of VDE applications)." 

• "Each VDE participant in a VDE pathway of content control information may set methods for 
some or all of the content in a VDE container, so long as such control information does not 
conflict with senior control information already in place . . . ." 

• "VDE supports commercially secure "extended" value chain electronic agreements. VDE can 
be configured to support the various underlying agreements between parties that comprise this 
extended agreement." 

• "VDE agreements support evolving ("living") electronic agreement arrangements that can be 
modified by current and/or new participants through very simple to sophisticated "negotiations" 
between newly proposed content control information interacting with control information already 
in place 

• "All participants of VDE 100 have the innate ability to participate in any role." 

• "any end-user may redistribute information received to other end-users." 

• "Any VDE user 1 12 may assign the right to process information or perform services on their 
behalf to the extend allowed by senior control information." 

• "As mentioned above, ROS 602 provides several layers of security to ensure the security of 
component assemblies 690. One important security layer involves ensuring that certain 


PAGE 75 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


component assemblies 690 are formed, loaded and executed only in secure execution space such 
as provided within an SPU 500." 

• "An important part of VDE provided by the present invention is the core secure transaction 
control arrangement, herein called an SPU (or SPUs), that typically must be present in each user's 
computer, other electronic appliance, or network." 

• "Moreover, when any new VDE object 300 arrives at an electronic appliance 600, the 
electronic appliance must "register" the object within object registry 450 so that it can be 
accessed." 

• "The present inventions also provide for the use of a trusted third party electronic go-between 
or intermediary in various forms, including the "virtual presence" of such go-between through the 
rules and controls it contributes for distributed governance of transactions described in the present 
invention, and further through the use of a distributed, go-between system operating in on-line 
and/or off-line modes at various user and/or go-between sites. Such a trusted third-party go- 
between can provide enhanced and automated functionality, features and other advantages such 
as, for example .... These and other features and advantages provided by the present invention 

• "The Virtual Distribution Environment provides comprehensive overall systems, and wide 
arrays of methods, techniques, structures and arrangements, that enable secure, efficient 
electronic commerce and rights management on the Internet and other information superhighways 
and on internal corporate networks such as "Intranets". The present inventions use (and in some 
cases, build upon and enhances) this fundamental Virtual Distribution Environment technology to 
provide still additional flexibility, capabilities, features and advantages. The present invention, in 
its preferred embodiment, is intended to be used in combination a broad array of the features 
described in Ginter, et al, including any combination of the following:...." 

• "parties using the Virtual Distribution Environment can participate in commerce and other 
transactions in accordance with a persistent set of rules they electronically define." 

• "The present inventions preferred embodiment make use of a digital Virtual Distribution 
Environment (VDE) as a major portion of its operating foundation, providing unique, powerful 
capabilities instrumental to the development of secure, distributed transaction-based electronic 
commerce and digital content handling, distribution, processing, and usage management." 

PAGE 76 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


• "The Virtual Distribution Environment provides comprehensive overall systems, and wide 
arrays of methods, techniques, structures and arrangements, that enable secure, efficient 
electronic commerce and rights management on the Internet and other information superhighways 
and on internal corporate networks such as "Intranets". The present inventions use (and in some 
cases, build upon and enhances) this fundamental Virtual Distribution Environment technology to 
provide still additional flexibility, capabilities, features and advantages. The present invention, in 
its preferred embodiment, is intended to be used in combination a broad array of the features 
described in Ginter, et al, including any combination of the following: ..." 

• "The Present Invention Solve These and Other Problems 

As discussed above, a wide variety of techniques are currently being used to provide secure, 
trusted confidential delivery of documents and other items. Unfortunately, none of these 
previously existing mechanisms provide truly trusted, virtually instantaneous delivery on a cost- 
effective, convenient basis and none provide rights management and auditing through persistent, 
secure, digital information protection. 

In contrast, the present inventions provide the trustedness, confidentiality and security of a 
personal trusted courier on a virtually instantaneous and highly cost-effective basis. They provide 
techniques, systems and methods that can being to any form of electronic communications 
(including, but not limited to Internet and internal company electronic mail) an extremely high 
degree of trustedness, confidence and security approaching or exceeding that provided by a 
trusted personal courier. They also provide a wide variety of benefits that flow from rights 
management and secure chain of handling and control." 

• "The present inventions make use of these persistent electronic rules to provide secure, 
automated, cost-effective electronic control for electronic document and other digital item 
handling and/or delivery, and for the electronic formation and negotiation of legal contracts and 
other documents." 

• "By way of non-exhaustive summary, these present inventions provide a highly secure and 
trusted item delivery and agreement execution services providing the following features and 
functions: 

Trustedness and security approaching or exceeding that of a personal trusted courier. .. 
Optional delayed delivery ("store and forward"). 
Broadcasting to multiple parties. . . . 

PAGE 77 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


Trusted validation of item contents and delivery. 

Value Added Delivery and other features selectable by the sender and/or recipient. 

Provides electronic transmission trusted auditing and validating. 

Allows people to communicate quickly, securely, and confidentially. 

Communications can later be proved through reliable evidence of the communications 
transaction-providing non-repudiatable, certain, admissible proof that a particular 
communications transaction occurred. 

Provides non-repudiation of use and may record specific forms of use such as viewing, 
editing, extracting, copying, redistributing (including to what one or more parties), and/or saving. 

Supports persistent rights and rules based document workflow management at recipient 

sites. 

System may operate on the Internet, on internal organization and/or corporate networks 
("intranets" irrespective of whether they use or offer Internet services internally), private data 
networks and/or using any other form of electronic communications. 

System may operate in non-networked and/or intermittently networked environments. 

Legal contract execution can be performed in real time, with or without face to face or ear- 
to-ear personal interactions (such as audiovisual teleconferencing, automated electronic 
negotiations, or any combination of such interactions) for any number of distributed individuals 
and/or organizations using any mixture of interactions. 

The items delivered and/or processed may be any "object" in digital format, including, but 
not limited to, objects containing or representing data types such as text, images, video, linear 
motion pictures in digital format, sound recordings and other audio information, computer 
software, smart agents, multimedia, and/or objects any combination of two or more data types 
contained within or representing a single compound object. 

Content (executables for example) delivered with proof of delivery and/or execution or other 

use. 

Secure electronic containers can be delivered. The containers can maintain control, audit, 
receipt and other information and protection securely and persistently in association with one or 
more items. 

Trustedness provides non-repudiation for legal and other transactions. 
Can handle and send any digital information (for example, analog or digital information 
representing text, graphics, movies, animation, images, video, digital linear motion pictures, 

PAGE 78 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


sound and sound recordings, still images, software computer programs or program fragments, 
executables, data, and including multiple, independent pieces of text; sound clips, software for 
interpreting and presenting other elements of content, and anything else that is electronically 
representable). 

Provides automatic electronic mechanisms that associate transactions automatically with 
other transactions. 

System can automatically insert or embed a variety of visible or invisible "signatures" such 
as images of handwritten signatures, seals, and electronic "fingerprints" indicating who has 
"touched" (used or other interacted with in any monitorable manner) the item. 

System can affix visible seals on printed items such as documents for use both in encoding 
receipt and other receipt and/or usage related information and for establishing a visible presence 
and impact regarding the authenticity, and ease of checking the authenticity, of the item. 

Seals can indicate who originated, sent, received, previously received and redistributed, 
electronically view, and/or printed and/or otherwise used the item. 

Seals can encode digital signatures and validation information providing time, location, send 
and/or other information and/or providing means for item authentication and integrity check. 

Scanning and decoding of item seals can provide authenticity/integrity check of entire 
item(s) or part of an item (e.g., based on number of words, format, layout, image-picture and/or 
test-composition, etc.). 

Seals can be used to automatically associate electronic control sets for use in further item 
handling. 

System can hide additional information within the item using "stenanography" for later 
retrieval and analysis. 

Steganography can be used to encode electronic fingerprints and/or other information into 
an item to prevent deletion. 

Multiple steganographic storage of the same fingerprint information may be employed 
reflecting "more" public and "less" public modes so that a less restricted steganographic mode 
(different encryption algorithm, keys, and/or embedding techniques) can be used to assist easy 
recognition by an authorized party and a more private (confidential) mode may be readable by 
only a few parties (or only one party) and comprise of the less restricted mode may not affect the 
security of the more private mode. 

PAGE 79 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


Items such as documents can be electronically, optically scanned at the sender's end~and 
printed out in original, printed form at the recipient's end. 

Document handlers and processors can integrate document scanning and delivery. 

Can be directly integrated into enterprise and Internet (and similar network) wide document 
workflow systems and applications. 

Secure, tamper-resistant electronic appliance, which may employ VDE SPUs, used to handle 
items at both sender and recipient ends. 

"Original 1 ' item(s) can automatically be destroyed at the sender's end and reconstituted at the 
recipient's end to prevent two originals from existing simultaneously. 

Secure, non-repudiable authentication of the identification of a recipient before delivery 
using any number of different authentication techniques including but not limited to biometric 
techniques (such as palm print scan, signature scan, voice scan, retina scan, iris scan, biometric 
fingerprint and/or handprint scan, and/or face profile) and/or presentation of a secure identity 
"token." 

Non-repudiation provided through secure authentication used to condition events (e.g., a 
signature is affixed onto a document only if the system securely authenticates the sender and her 
intention to agree to its contents). 

Variety of return receipt options including but not limited to a receipt indicating who opened 
a document, when, where, and the disposition of the document (stored, redistributed, copied, etc.). 
These receipts can later be used in legal proceedings and/or other contexts to prove item delivery, 
receipt and/or knowledge. 

Audit, receipt, and other information can be delivered independently from item delivery, and 
become securely associated with an item within a protected processing environment. 

Secure electronic controls can specify how an item is to be processed or otherwise handled 
(e.g., document can't be modified, can be distributed only to specified persons, collections of 
persons, organizations, can be edited only by certain persons and/or in certain manners, can only 
be viewed and will be "destroyed" after a certain elapse of time or real time or after a certain 
number of handlings, etc.) 

Persistent secure electronic controls can continue to supervise item workflow even after it 
has been received and "read." 

Use of secure electronic containers to transport items provides an unprecedented degree of 
security, trustedness and flexibility. 

PAGE 80 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


Secure controls can be used in conjunction with digital electronic certificates certifying as to 
identity, class (age, organization membership, jurisdiction, etc.) of the sender and/or receiver 
and/or user of communicated information. 

Efficiently handles payment and electronic addressing arrangements through use of support 
and administrative services such as a Distributed Commerce Utility as more fully described in the 
copending Shear, et al. application. 

Compatible with use of smart cards, including, for example, VDE enabled smart cards, for 
secure personal identification and/or for payment. 

Transactions may be one or more component transactions of any distributed chain of 
handling and control process including Electronic Data Interchange (EDI) system, electronic 
trading system, document workflow sequence, and banking and other financial communication 
sequences, etc." 

"All of these various coordination steps can be performed nearly simultaneously, efficiently, 
rapidly and with an extremely high degree of trustedness based on the user of electronic 
containers 302 and the secure communications, authentication, notarization and archiving 
techniques provided in accordance with the present inventions." The asserted claims also are 
invalid for violating the enablement and written description requirements to the extent that they 
are construed to recite subject matter that was not enabled by the application from which they 
issued, and/or not disclosed (e.g., the claims recite an element that was not disclosed in the 
written description, recite an element more broadly than was disclosed by the written description, 
recite subject matter for which there were no "blaze marks" in the written description pointing to 
such subject matter, combine elements from different embodiments that were not so combined in 
the written description, etc.) in that application. For example, at least the following bold-faced 
claim language was not so enabled and/or disclosed, at least not as the claims apparently are 
being "construed" by InterTrust to attempt to support its untenable infringement allegations: 
'193 

1) A method comprising: 

a) receiving a digital file including music; 

b) storing said digital file in a first secure memory of a first device; 

c) storing information associated with said digital file in a secure database stored on said 
first device, said information including at least one budget control and at least one copy 
control, said at least one budget control including a budget specifying the number of copies 

PAGE 81 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


which can be made of said digital file; and said at least one copy control controlling the 
copies made of said digital file; 

d) determining whether said digital file may be copied and stored on a second device based 
on at least said copy control; 

e) if said copy control allows at least a portion of said digital file to be copied and stored on 
a second device, 

f) copying at least a portion of said digital file; 

g) transferring at least a portion of said digital file to a second device including a memory and an 
audio and/or video output; 

h) storing said digital file in said memory of said second device; and 

i) including playing said music through said audio output. 

2) A method as in claim 1, further comprising: 

a) at a time substantially contemporaneous with said transferring step, recording in said first 
device information indicating that said transfer has occurred. 

3) A method as in claim 2, in which: 

a) said information indicating that said transfer has occurred includes an encumbrance on 
said budget. 

4) A method as in claim 3, in which: 

a) said encumbrance operates to reduce the number of copies of said digital file authorized 
by said budget. 

1 1) A method comprising: 

a) receiving a digital file; 

b) storing said digital file in a first secure memory of a first device; 

c) storing information associated with said digital file in a secure database stored on said 
first device, said information including a first control; 

d) determining whether said digital file may be copied and stored on a second device based 
on said first control, said determining step including identifying said second device and 
determining whether said first control allows transfer of said copied file to said second 

PAGE 82 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


device, said determination based at least in part on the features present at the device to 
which said copied file is to be transferred; 

e) if said first control allows at least a portion of said digital file to be copied and stored on a 
second device, 

f) copying at least a portion of said digital file; 

g) transferring at least a portion of said digital file to a second device including a memory and an 
audio and/or video output; 

h) storing said digital file in said memory of said second device; and 

i) rendering said digital file through said output. 

15) A method comprising: 

a) receiving a digital file; 

b) an authentication step comprising: 

c) accessing at least one identifier associated with a first device or with a user of said first device; 
and 

d) determining whether said identifier is associated with a device and/or user authorized to 
store said digital file; 

e) storing said digital file in a first secure memory of said first device, but only if said device 
and/or user is so authorized, but not proceeding with said storing if said device and/or user 
is not authorized; 

f) storing information associated with said digital file in a secure database stored on said 
first device, said information including at least one control; 

g) determining whether said digital file may be copied and stored on a second device based 
on said at least one control; 

h) if said at least one control allows at least a portion of said digital file to be copied and 
stored on a second device, 

i) copying at least a portion of said digital file; 

j) transferring at least a portion of said digital file to a second device including a memory and an 
audio and/or video output; 

k) storing said digital file in said memory of said second device; and 
1) rendering said digital file through said output. 

PAGE 83 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


19) A method comprising: 

a) receiving a digital file at a first device; 

b) establishing communication between said first device and a clearinghouse located at a 
location remote from said first device; 

c) said first device obtaining authorization information including a key from said 
clearinghouse; 

d) said first device using said authorization information to gain access to or make at least 
one use of said first digital file, including using said key to decrypt at least a portion of said 
first digital file; and 

e) receiving a first control from said clearinghouse at said first device; 

f) storing said first digital file in a memory of said first device; 

g) using said first control to determine whether said first digital file may be copied and 
stored on a second device; 

h) if said first control allows at least a portion of said first digital file to be copied and stored 
on a second device, 

i) copying at least a portion of said first digital file; 

j) transferring at least a portion of said first digital file to a second device including a memory and 
an audio and/or video output; 

k) storing said first digital file portion in said memory of said second device; and 
1) rendering said first digital file portion through said output. 


'683 

2. A system including: 

a first apparatus including, 

user controls, 

a communications port, 

a processor, 

a memory storing: 

a first secure container containing a governed item, the first secure container governed item 
being at least in part encrypted; the first secure container having been received from a 
second apparatus; 


PAGE 84 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


a first secure container rule at least in part governing an aspect of access to or use of said 
first secure container governed item, the first secure container rule, the first secure 
container rule having been received from a third apparatus different from said second 
apparatus; and 

hardware or software used for receiving and opening secure containers, said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers; 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said first apparatus, said 
protected processing environment including hardware or software used for applying said 
first secure container rule and a second secure container rule in combination to at least in 
part govern at least one aspect of access to or use of a governed item contained in a secure 
container; and 

hardware or software used for transmission of secure containers to other apparatuses or for 
the receipt of secure containers from other apparatuses. 

28. A system including; 
a first apparatus including; 
user controls, 
a communications port, 
a processor, 

a memory containing a first rule, 

hardware or software used for receiving and opening secure containers, said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers; 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said first apparatus, said 
protected processing environment including hardware or software used for applying said 
first rule and a secure container rule in combination to at least in part govern at least one 
aspect of access to or use of a governed item; and 

hardware or software used for transmission of secure containers to other apparatuses or for 
the receipt of secure containers from other apparatuses; and 

PAGE 85 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR3-3, 3-4 




a second apparatus including: 
user controls, 
a communications port, 
a processor, 

a memory containing a second rule, 

hardware or software used for receiving and opening secure containers, said secure 
containers each including the capacity to contain a governed item, a secure container rule 
being associated with each of said secure containers; 

a protected processing environment at least in part protecting information contained in said 
protected processing environment from tampering by a user of said apparatus, said 
protected processing environment including hardware or software used for applying said 
second rule and a secure container rule in combination to at least in part govern at least one 
aspect of access to or use of a governed item; 

hardware or software used for transmission of secure containers to other apparatuses or for 

the receipt of secure containers from other apparatuses; and 

an electronic intermediary, said intermediary including a user rights authority 

clearinghouse. 

29. A system as in claim 28, said user rights authority clearinghouse operatively connected to 
make rights available to users. 

PLR 3-4 Production 

Each reference identified pursuant to PLR 3-3(a) but not in the prosecution history, and 
the documents referenced in PLR 3-4 that are sufficient to show the operation of the accused 
features of the products specifically identified in InterTrusf s PLR 3-1 Statements of October 29 
and November 5, 2001, and "Addendum" dated March 12, 2002, has been or is being produced, 
or is otherwise available for inspection and copying. 

Dated: August 16, 2002 


By: 


WILllAM L. ANTHONY, State Bar No. 106908 
ERIC L. WESENBERG, State Bar No. 139696 



PAGE 86 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


Of Counsel: 

T. Andrew Culbert, Esq. 
One Microsoft Way 
Building 8 

Redmond, WA 98052-6399 
Phone: 425-882-8080 


HEIDI L. KEEFE, State Bar No. 178960 
MARK R. WEINSTEIN, State Bar No. 193043 
ORRICK HERRINGTON & SUTCLIFFE, LLP 
1000 Marsh Road 
MenloPark,CA 94025 
Telephone: (650) 614-7400 

STEVEN ALEXANDER 
KRISTIN L. CLEVELAND 
JAMES E. GERINGER 
JOHN D. VANDENBERG 
KLARQUIST SPARKMAN, LLP 
One World Trade Center, Suite 1600 
121 S.W. Salmon Street 
Portland, OR 97204 
Telephone: (503) 226-7391 

Attorneys for Defendant 
MICROSOFT CORPORATION 


PAGE 87 - MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. PATENTS 
6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 



DECLARATION OF SERVICE BY MAIL 

I am more than eighteen years old and not a party to this action. My place of employment 

and business address is 121 S.W. Salmon St., Portland, Oregon 97204 

On August 16, 2002, 1 served: 

MICROSOFT'S PRELIMINARY INVALIDITY CONTENTIONS REGARDING U.S. 
PATENTS 6,253,193 & 6,185,683 PURSUANT TO PLR 3-3, 3-4 


by e-mail and by placing true copies of these papers in each of separate envelopes addressed to: 


Michael Page, Esq. 
KEKER & VAN NEST, LLP 
710 Sansome Street 
San Francisco, CA 941 1 1 
mhp(S)kvn.com 

Steven H. Morrissett, Esq. 
Finnegan Henderson Farabow 

Garrett & Dunner 
Stanford Research Park 
700 Hansen Way 
Palo AltoCA 94304-1016 
steven.momssett(3)finnegan.com 


Stephen E. Taylor, Esq. 
Taylor &Co. Law Offices 
1050 Marina Village Parkway 
Suite 101 

Alameda, CA 94501 
stavlor(2)tcolaw.com 


and sealing the envelope, affixing adequate first-class postage and depositing it in the U.S. mail at 
Portland, Oregon. 

I declare under penalty of perjury that the foregoing is true and correct. Executed on 
August 16, 2002, at Portland, Oregon. 


(SIGNATURE) 


(PRINT NAME) 


o 

1 

«- -o 

H c 

b es 

*rf CA 

H o 

*« DC 
w .S 

g a 

e o 
« .S 

r ^ 
s.i 
r s 

§1 


St « 

If 


3 on 

w e 

s « 

o a 

E & 

T3 u 


H 

u 


Cm 

H 
to 

O 

c/i 

O 

u 


u 
H 


IS 

> 


oo 


O 

H 
Cm 

c/5 


S 


2 £ 


C 1 



1*1 

2 


3 € 


1 1x1 


.2 «2 ° 


J s 

& ° -r 


J ||| 
a, Z2w 


i O C 

>T3.2 
£ 


3 


: C e £ ca 


a> .0 


2 

■s 

C S * 

T §--5 


If 


1* JSI 


lis 
III 


c 2 
— -o 
• c <■ 

> - I 

sr. 

S p C 

? s § 


2 

c 22 


5 
— c 


&0 


.52 


H ^ U S 


t: . 

U Ml 

3D 


o U «3 
E £ 2 -o 


I! 


^ 4> 

w h u 
« £ « 

•o W) 

•3 6 -c 


§5 


§*fN 


11*3 

2 Z 0 — 

5 O e • 

9- s - c -5P 
°* c 5 £ 



«> m 

to ^o. 


Mr- 


I 


i o 


I 


i 


s 


3 COO 

H IS 

* s 
£ s 

-a e 

JB © 
"3 m> 


ai 


7* a 

ii 

© w 

08 3 
> <S 

•5 bfl 

a « 
e a. 

I E 


8 

CO 


b 
5 


> c 

ii 

to o 

8 § 


C "t: 


■si " 5 

a is- Si 


o 

r 

c 

8 E 


c 

1 

§.. 

- o p o 
00 w> o. 

a i s s 
e- 1 & s 




--Is 
Hit 




E.H J | 

Sits: 



3 St* « 


"S ,2 « 2 o o 


t3 6 


3 


■S w 
c 7 o 

.s .s 


Hi 


3 


5 ' 3 § 1 


iiii 



E « S § £ S|^o 

a a 8 1 £ £ a 3 


S..S 


a E-8-s 
fa b« | 


8 


S3 


a s 


s 

II 

II 

s s 

I 1 


e3 on . 



CX.O 


2 
5 





3 
•o 


i 


■ill 55 ! i 

•s o = -S 5 3 a 


a 
«#■ 
e 

I 
•? 

.5 2 

3 COO 


>>g 

•fi 9 

■o .2 

V > 

= t 

03 W> 
on .5 
C8 »Q 

22 3 
E a 

3-s 

*i 
ii 

on © 

r a 

2* 

ii 

O S 

•a 1 

a ~ 

* 5? 

03 ,g 

(A S 

a « 
e a 
E E 


U I 


9 
C 

c 

o 


s 

IT) 
00 


O 

H 
Z 
W 

<*3 


is* 

|8- 


E 


4) _T C 

.at jqjs^i 

-a « D %-g 
u d v u o S < 

5 E.S t 


ouw| S ? 

** C o\ ^ • - 

^ " W O Q> -M «i 

MllfU 

J 3 5 S 8 .S | 


C O co 

ills 

'E.8 »l 


re 


ip 


g cu 


O bpCU 

S2S 


ill 
551 


.s e 

s "3 
o\ x a -a 

J J 1.8 

t o JJ w 

II35S 



* 6 2 


c > 

1° 
3* 


<3 

I s * 


00 ^ 


la' 


o to g 


l g -S 1 1 1 




111511 

<6£ = Qw 



to "5 



Hi 


1 

1 

i 


I 


t<5 
£5 


5 


e 
u 
a 

o 

cu 


3 000 

T s 

>» art 

-o .2 


2 3 
S 73 

« .s 

2 3 


T s 

a i 

O tu 

=3 t 


DiJ V 


ea 
3 
•o 
ca 
Cl< 
es 

rb 

and a memory 

a second apparatus 
operating at a particular 
security level may develop 
information (an object) 
classified at a particular 
security level, and store it at 
apparatus 1 

when a third apparatus seeks 
access to stored object, it 
must provide security level 
information (e.g. a security 
label) 

system hardware or 
software (e.g., Apparatus 1 
applies BLP rules, which 
determines whether the third 
apparatus is granted access 
or not. Permissions include 
but are not limited to write, 
read, copy, execute). 

processing has safeguards; 
see, e.g. (5) re BLP rules. It 
would also be obvious to 

nt 

and a memory 

File with any "item" "at 
least in part encrypted" 
received from a second 
"apparatus" -e.g., a 
cryptographically signed 
and/or sealed or otherwise 
at least partly encrypted 
file received from another 
computer 

InterTrust*s 3-1 Statement 
uses "rule" in so general a 
sense that it could be any 
password, key, ticket, 
permission, clearance, 
right, capability, or access 
control used in NT (see (6) 
below) 

system hardware or 
software 

"1" and 2 nd rules" as 
alleged by InterTrust could 
consist of any 1 or more of 

Telescript 

and a memory 

a first agent (object), or 
associated file, encrypted in 
whole or part, received from a 
2d "apparatus." 

a permit from a 3d apparatus 
(e.g. associated with a 2d 
agent meeting a 1st) 

system hardware or software, 
e.g. engine 

processing has safeguards; 
"rules" as InterTrust alleges 
the term would cover permits 

Chaum 

and a memory 

One or more enabling 
credentials or "container" 
thereof 

applying any "rule" obtained 
from a "shop 1 * or "rule'* for 
exposing credit info 

system hardware or software, 
e.g. to process credentials 

processing has safeguards; 
"rules" allow electronic 
commerce of varying 

ATMs and other 
examples in Davies & 
Price 

memory stores: 

encrypted files, messages, 
session keys and terminal 
keys; ATM card or wholly 
or partly encrypted 
instructions or data 
received from bank 
computer (e.g., balance) 

"rule" of any transaction, 
or PIN or watermark 
and/or user ID from card; 
"rights portion** of data 
sent from key distribution 
server 

system hardware or 
software for opening files, 
messages, deciphering 
session keys; ATM 
receives cards having keys 
or other "governed" data; 
receives data from bank 
computers 

second "rule" could be, 
e.g., balance information, 
account limits, or any otha 

s 

« 

E 
s 

V 

See 2(a) 

so-called "secure 
container** as alleged by 
InterTrust would cover 
Kerberos tickets which 
may be received from a 
server, e.g. for a read 
capability. 
Alternatively, any 
partly encrypted file. 

so-called "rule** 
received from e.g. 
server or end server, or 
knowledge about the 
authorization received 
from another source; 
capabilities may be 
revocable and have 
expiration times; access 
controllists support 
compound principal 
identifiers 

passim; possible "rules" 
include for-use-by- 
group, accept-once, 
quota, authorized, limit- 
restriction 

"rules" as asserted by 
InterTrust may be any 
of multiple (e.g. 

INTERTRUST'S 
PLR3-1 
STATEMENT 

Consumer's computer, 
as shown in WMRM 
SDK 

Secure container 
(packaged Windows 
Media file), received 
by consumer's 
computer from 
"Content provider" 
(WMRM SDK, Step 
3), which contains 
encrypted governed 
item ("Encrypted 
content") 

Rights portion of 
signed license, 
received by 
consumer's computer 
from "License issuer" 
(WMRM SDK, Step 

Windows Media 
Player and Windows 
Media Rights Manager 

l w and 2 nd rules consist 
of any two valid rules 
as specified in the 
Window Media Rights 

CLAIM LANGUAGE ; 
(InterT rust's version) 

(4) a memory storing: 

(i) a first secure container , 
containing a governed 
item, the first secure 
container governed item 
being at least in part 
encrypted; the first 
secure container having 
been received from a 
second apparatus; 

i 
i 

(ii) a first secure I 
container rule at least in 
part governing an aspect 
of access to or use of said 
first secure container 
governed item, the first 
secure container rule 
[sic], the first secure 
container rule having 
been received from a 
third apparatus different 
from said second 
apparatus; and 

(5) hardware or software 
used for receiving and 
opening secure containers, 
said secure containers each 
including the capacity to 
contain a governed item, a 
secure container rule being 
associated with each of said 
secure containers; 

(6) a protected processing 
environment at least in part 
protecting information 
contained in said protected 


a. 

ca 


1 "8 § 2 I 

1 si 

° O W 3 « 4) 

si nil 

K c o c o o 

3 D. ed 3 O W 


8 


2 S 

D. 

If 

g § 


S -r- O 60 

3 -o = 


. 1 .S S 1 I •§ -S .3 


O S 3 § 3 


S « 


° a 


4 3 £ * 


•S .5 


8 8 



i 


i s 
i ? 

i 8* 

; a 

: e 



S 
s 

2 





.S « 

« .* 

E* ) 

o E 

li s 



£§338 



5! 

si 


E 


3 coo 


jr-8 

« BP 
w .S 

« -o 
2 3 

si 

r o 
*5 


•8 3 
1 c 


.2 bn 

iJ ^> 

w S 
C C8 
O Q, 

S E 


T3 

a) 


Bell-La Pad ula 


See 2(a) 

See 2(a)(6) 

See 2(a)(7) 

NT 


See 2(a)(5) 

See 2(a)(6) 

See 2(a)(7) 

Telesciipt 


See 2(a)(5) 

See 2(a)(6) 

See 2(a)(7) 

Chaum 


See 2(a)(5) j 

See 2(a)(6) 

See 2(a)(7) 

ATMs and other 
examples in Da vies & 
Price 


See 2(a)(5) 

See 2(a)(6) 

See 2(a)(7) 

Neuman 


See 2(a)(5) 

See 2(a)(6) 

See 2(a)(7) 

INTERTRUST'S 
PLR3-1 
STATEMENT 

first rule is a right 
received as part of a 
signed license 
(WMRM SDK, Step9) 

Consumer's computer 
receives Windows 
Media file (secure 
container) via 
communications port 
(WMRM SDK, Step 
3) and applies secure 
container rule or rules 
via Windows Media 
Player and Windows 
Media Rights 
Manager. 

Processing 

environment includes 
Windows Media 
Rights Manager and 
Windows processes 
for protecting 
operation of Windows 
Media Rights Manager 

Hardware or software 
employed in 
transmitting Windows 
Media files, including 
for example 
consumer's 
computer's 
communication port 
and Windows Media 
Player (WMRM SDK, 
Step 3) 

CLAIM LANGUAGE 
(InterTrust's version) 


(5) hardware or software 
used for receiving and 
opening secure containers, 
said secure containers each 
including the capacity to \ 
contain a governed item, a 
secure container rule being 
associated with each of said 
secure containers; 

(6) a protected processing 
environment at least in part 
protecting information 
contained in said protected 
processing environment 
from tampering by a user of 
said first apparatus, said 
protected processing 
environment including 
hardware or software used 
for applying said first rule 
and a secure container rule 
in combination to at least in 
part govern at least one 
aspect of access to or use of 
a governed item; 

(7) hardware or software 
used for transmission of 
secure containers to other 
apparatuses or for the 
receipt of secure containers 
from other apparatuses; and 


1 


i 


i 


2 3 
.a w 


60 

* H 

ft 

8 § 


2 


8 


8 


a 
o 

£1 


II 


S 73 


: 8 

iS| 



4* 


so « 
o g 

ea m 
> *2 

.S u 

V «S 
J3 -m 
M 

Ml V 

Si 

e a 
B B 


I 
8 



8 


c a. 


1 ?l 111 J 

| fi I 8 e 



-o "Si 
.2 


III b*ISs 
f iff $1H 



8 & e 

5 p - 

g I 2 

*.§■§• 

w a) E 


li 


oo is* 

C Ou 

"« £• 

to ra 

8 £ e 
S g-S. 

si 2" 


S fc 

is 


8 £ - § So 

a £ s g s 

c c « S3 
■3* = -S i 2 
~ -§ ft <E 
8 g| 8 I 



8 „ 

©I 

W.8 


- 8 S g " 

- - O w 

5 1 5 

2 E § 

3 o — 


|8BT 


w O CX X) *0 lZ 

M •§ 2 6 o £ 

o > *g 5 o ii 




i 

s 

3> 


o 



•A S 

■o .2 


il 

'I 
«l 

o\ © 
> (S 

.5 u 

s s 

© a 
S E 
» o 

U i 


I 


II 


>< a 


u 


x a 


•s 


§1? 
o b E 

o .£> = 

S « e 
o OT c 
S> S3 £ 

xt : — 

si 


l o ~ 

- <£: £ «> 

o -o 7^, 

'5 o - 


CO 


x a 



I § 

I e 
-3 "S e 

Hie 

O WJ £ 


If: 


I 

— 


il 


1 

I* 

3 .s 


-6 3 

e s 

U 60 


o w 


o 


B..g 8 c 

c S « « 

-° 2 

c n c 

a/ C O "C 


1 E 


ill 


.0 a 

HQ 


eu « O 
U DO C 

& B 

3 il 


•s-z 

» .S3 




S « g 

3 a. ^ 

111 
2 St 


T3 <; 


w O 

S 2 


.5 


9 2 1 ^5 
Of 


g-S; 


* 


E 

9 

S3 
JB 

u 


8 

CO 


a =s S 

2 

0) U O nv 


1 H 




ai 5 

£■8 


1-1 'I 

Sill. 

f 8 £4 


tl 
- g 

c3 a ? u 






T3 


o 


In 


CUD 


03 

s 

00 


c/5 


S 



*s s -S 
2 g"£ 


a; 

CO M 

D h 
H 


* * .2 


o ~ 


£ U s 

c St 

8 1 g 

<u a> u 


<U to 

8 § * i 

w . « t 

^3S3 


rlS 

I < *3 
E 


11 


w u ™ 
. * c .5 « 


a, to O 


•si*** 


. o 


« u « « 


5 

8 


rt t< .2 <"-' On 


if J 


8 < 5 § *g k S 
6 g § <£ «5 C c 


O. ^ ^— v "* 


1 = 5 

2 


o 


pi ca w u 


.SS.2 


i - § 


.2> 
do « -r 

.S « > 

■o 82 
J5 *? e 

|i| 


a\ w < 

III 
Ill 


■e 



e 

% 


si 




s 


m ° 


is 


i 

■ *S "a ' 


3 3 » 

a a; 
-i! 

8 1 


E 
S 

"H _ , 
o tc 1 

if- 


Eg 


■ 5p-c 



I 



1 


• 

£ 

5 


Q 

"2 i 


XT 
O 


5 
CQ 


eg 


o 
& 

€1 


"Si 


S - 

« .2 

I! 


" o 


a ~ 

tn S 

e 03 

e a. 

§ S 

w o 

« 5 

2 S 


J? 5 


H « « ** 


^ O C 

-s s 

Sox" 


w 5 3 
IT 5 £ 


isms 


S 8 

DO w 

ill 

*> a 
^22 


III 


$ .s-e 

4> U O 

e e & 


» J2 

^ E c 
6 - «• 


4> 

E 


11 




§1 

9 5 
o s 





I * 

^ § S ^ | 

' o « S S w 

•a 2 E ^ e 

8 


.2 ^ * j 

Si 11=1 




^ if 


5 flea's S* 

° fb"§«> 8-Sf I 
mS s o p « 




ijthgi 



^ 2 
■f 9 

u o 

si 


: 6 

: >> 

bp 3 

< 8 


3 i 


■a 


CO 


all® 


" 0 


a 

.5 M 


~ i 

JQ 9 

J? I 


B "3 

T3 


a! 


r a 

si 

so « 

" a 
© g 

3 I 
=3 t 


» a 

w> « 

*§ M 

M C 

B « 

o a 

a s 

4» O 


5 S 
u i 



1^8 
o bo -a 


1 8 


g <*< 


111 
1 1 1 IS 


a 5 


1.1 


a s £ s 


o 
5 


5 


3 000 


>> s 

T3 .2 

&I 

« ■§ 

« 5 

« ,3 
P - 

*l 

So 5 

© v 

1 ~ 

.s * 

43 

~ H 
•S m 

m a 
a os 


e 


a 

E 
S 


u | 



..So 

II? 

e .ts so 


§ I S3 o-n 


to O 


E S3 _ 


2 ? " § *§ 


S E£ 



> « — 

o«ffl 
•g .2 Q 

O O Q 

!S3S 


ill! 

"x *>»'« 2 

•° x> x> x 
2 *B 

13 = £ a 

8.g3 


. i 

rt > 



8 § 8 ° I 
q 8 11* 

inn 




Sl 1 1 a I 


* J' 

o c 

il 

. > 
2 <° 

II 
go 

8 § 

il 


3 

> — 
i g < 


o c .a 

■7 ■— 60 

«j Q o 
1.11 

•n ^ 


1 b| a 


1 2 ie-.s 

li si 

o s E s 

'til 

c o 

.= o > « 



S 8 
JS a 


II 

1*1 

2 ^ 


1 


§8: 


< 5 


.5* 3 

E f 


Ml 

« 8 e 

E S 8. 

xi E E 

.2 3 B 

O W> W 

.2 oi to 



1 'I S 1 2 

b1 1 Hill 





I* 


o 

C M 


.O 9 

e> ^ 

s ° 

3 * 

1 1 

« .5 

r> «~ 

o\ o 

;r a. 

© v 

I * 


to S 

e a 

© a 

E £ 


U | 



* £ 5 1 


a> 'Eo 
to c 
u o 

« & 
§ e 

60 — 

.S 

g £ 

00 


*- o O 
^ U M 


E SP 


§| g g 
E § S w 




DO 

.S 

3 C 

s 5 s 

§| £ 

S..S g 

Q o 

O -S o 

° c 3 


O o H) fli . 

!« o ffl x 


u - 


• a If! 


»> o 

.1 J8 3 
o ^ fc > 2 


■S E 

e* 

& £ 

•a w 

•g s -s i § i 

« j= Si o - -* 


T3 
§ 

I 1 s : 

3 ^ a. 


° E p 


HI! 


C « ») 

'3 I I 


I- 
&S E 



21 

if 

£ oo 

O £ 
« o 

5 w 


OT3 SdQ 

0 c S O 

1 « I w 

? O g TJ 

1 S B § 

c S H w 

< .2 .S ^ 


»| § 

- O M 

1 if 

•2s d. w 

^g>§ 

.2^2 

ego- 

§ r j 




"8 

o 

I 


■e 

w Q 


> § t 


o 

: Q 


« S 5 


E o 
"S 8 

s s 


^-5 I § 

S 3 2 » 
c4 u n ia 


2 5 

cx c < 

rt O 
< '3 


■& ° -2 
*c 

60 D 


« (50 

3 -S _ 
'» H *- 
c n a 

II s 


*| 1 


! V 3 O 

L O O 


3 -c I 

2 ^ I 

3 El 


2 J 


2 « 


to 


3 

4: 


a 


3 

:§>: 


& 

< j 



.3 

05 


3 coo 
Hi 


felt E 


» .5 

S 75 
3-9 

« 5 


3.1 


II 
"S 8 

.5 


tS a 
s a 
© a. 

if 


e 


C o 

§1 


9 


C 
O 


3 


cu 


09 

00 

VO 

00 


O 


(4 

s 

«3 


» s 
-1 

.2 5! 




I 

1 


8 | 


el- 

818 

5" w I 


bo — ™ 

nil 

§ o gW 
2 3 .S2 


■a 5 
2 | 


a; 3 Q oo s co a. a. -a > 


5 

a 

tS 
O 


C i- °* 25 .3 

o «- !— ' rt 


J*<3; £ 

ill* 

w C g u 

a! O & 2 


> V 

_ w 

O CA 

I.E 

"O u 

§ 8 i 



fa 


> E 


*> Q . 
few 


BO 

.5 


a 


i 


I 

3 


0 

1 


do 


e 


3 C09 

a g 
*l 

I* 

si 
il 
'3 & 

Sir 

if 

« 5 


r o 

si 

H= t: 

> (S 
3 *- 

« a 

** H 

DO V 

» S> 

* .s 
t >> 

w a 
e 08 
© a. 

§ i 
1 * 


DC 

ll 

as £ 


U o 
< £ 


*8 



u r 


a. 
c 

il 

61 


£ » 


1 8 

o « 


13 E 




J! I'M 



o ° 


I" 




- if 111 

5 u tS 9 -P 


.1 I o 


i-i bo 


§.5 S-S 8.S 



111 



I 



« Q 


o .2 3 E .2 
5 IS 8 82t 


i 


a 

s 

.2 
1 
1 


to 

s 


i 

E 

03 


li 

o 


3 cos 

^ ° 


si 
Si 


9t O 

r 1 c 

o g 

OA « 


OS 

as" 

h L , 

&< 



vi S 

s a 

o a. 

B E 


3 JJ 


2 










I 


it 


o 

a> 


Si 

^ ° 

•O S 

■si 
JP-S 

M .5 
« -5 

la 

if 

* .5 
©\ o 

r e 

8 I 
r\ a. 

o <u 

If 


K 

a ~ 

•3 u> 

H 

e « 

■8 § 

U l 


i 
I 


P 

CO 



2 Si 


H 


-a 

WD 


> 
s 


CO 
00 


H 



a: 

as 


•| .s £ ! 
a* e 

So 


-g -3 "£ 

leg 
n o i 

.2 e € 
c g e 


£p c c 

2d 


00 -C 


o X 
> o 

u 8, 

CO ( 


Q 2 


> u 


.s Ȥ ft 

■5 £ -a o o 


; 3 e 

o — 


S 8 
5 S 

11 


.= " u 
2 5 

u r* 3 - . 
5 ^ *S 



O 0> - 

P .s 


i §| 

"*? 2 .2* * 



1 


o a 


I 


5, 

1 



c2 8 

i % 

Is 
Is 

cj -a 


9 


8 

CO 


8 

00 



33 

rsi 

8 

00 


- si c 

B 1 5b 
8 'w o 

x ° a 

§ ■ 

So'"' 


4> l— ' ^ 5" 
w ii 5 


S 


1 


1 fcrf 





Q o 


8 A 

ill 

I § ! 


8 s 
II 


5 Si 


i 

i 

3> 


I 




r 


? s 


li 


11 
!J 

if 
If 


•II 



3 «p 

v. -a 
H g 

£ S 
■o .2 

DA £ 
ii O 
"3 M 

«> *S 

M no 

3 - 
B u 

« .£ 

2* 

m 

a I 


r s 

« I 

" a 
11 


'Z a 

JZ 

** K 

6JD « 

M .3 

iJ >> 

m e 

s a 

o a. 

S E 

« O 

•O U 


3 


4> 


C3 

a 

d 

H 
H 

PL, 
C/3 


E U 


U M 


1 ° 

< E 
- 8 


5 a 



8 v 

c O <o 
Si 

U 3 c s a .S w K 


I s 


2 

1.1 
§■1 


1 

to O 

S* 

s s 




»- 3 O 
3 B 3 
C T3 e 


.-I w 1 

S&1 


II 111 


CQ T3 


S 5 


s 


111 


.2 a 
*S 8 
E« 


J* 

13,3 


2-5 


is 

p 


0. op E 

13 AS 

.2 - o 
§1 > o 

PI is 



I" 

> jo 
"53 tc 
$ o 

|1 

* i 

.SP e 


O c 


w>a J 

1 2 I 
" & ° 

oil 

I H 

^ E -a 

SO S .§ 
00 w *o 



-a £ I a 1 1 -S-l § 
laEf'Si If S 

Is § 3E l-i 


S3 


1 = 1 
811 
®f.i 


I 


JO 3 

bus 
« © 

75 W> 


E -3 

3 -s 
'I 

<s .5 

0\ o 


" a. 

0 8 

1 * 


m s 

s * 

o a, 

E E 

« o 


EU 
s 


i = 

•a .e 

w 
E 


s2 s 

H S 

§ 

w « 


3 » (5 -2 


s 2 

-I 

1 A 


O o. o 


£.s J 3 f |s s 

O 3 60 u d C -2 
T3 C .S J* -O 
« O 3 O rt 


9 1>§ 


'2= 8 8 | 
§11.2 S 


2 ° 

I? 

u o 

o > 


§ tfll 




g -o ^ <g S 

O ^ J3 > W (U cd 


s i 

o E 




00 t> 


§12 i .§ 


8 E 


18 

I S 


D. 

^ ■S 8 

Is S| 

5-8 8-1 


§o-2 


m 


= 1 


."6 .5 - 3 

c 5* 3 -a c 

v .5 e «9 3 

o C o « o 


4> -S 


-1 


•II 



g *§ 8 ^ I • - » 

11*111.2 


i.2 
ts ^ 


■a 


a c .2 — *s c u 

lllllil 



DO O O 

« Ui s o 




O U U — _ — 



1 1 8 3 "3 -I i 

§ «ts 8 g o 

I c 1*1 1 § r 

I s ! jB * 

.s J g S 3 a 3 



to 

s 


<« .S 

£ - 
•a = 

if 
il 

« .s 


O o 


5 


v> e 

s es 

© a 

a b 

a « 

U i 


Neuman and/or 
Chaum 


One or more rights, 
permissions, keys 
and/or credentials 
effect "copy 
control" 

if allowed, 

copy is made, 

and transferred to a 
2d device which 
includes a memory 
and audio and/or 
video output 

where it is stored 

and played 

CUPID 


Origination Server 
governs whether files 
can be transferred; 
CUPID clients receive 
files based on 
information they 
receive via their 
message queues and 
notification servers 

if allowed 

a copy is made 

and transferred to a 2d 
device which includes 
a memory and audio 
and/or video output 

CUPID Client stores 

and renders 

HeUman 


determines whether 
file may be copied 
to base unit or 
player, or played 
(e.g. to be recorded 
on another device 
while playing) 

if allowed, 

copy is made, 

and transferred to a 
2d device which 
includes a memory 
and audio and/or 
video output 

where it is stored 

and played 

CNI/IMA 94 


-"write protect" status 
determines whether 
can copy 

- rendering program 
determines whether to 
copy and store on an 
output device, e.g. a 
video display or 
printer or audio device 

if allowed 

a copy is made 

2d device includes a 
memory and audio 
and/or video output 

"document" is 
transferred 

render on 2d device 

Blaze 


directory and/or file 
keys, permissions, 
rights, and/or 
privileges determine 
whether file may be 
copied to 2 nd device 

if allowed to copy 

a copy is made 

file is copied to a 2 nd 
device including a 
memory and an audio 
and/or video input 
(eg. a PC) 

storing the file in the 
2 nd device's memory 

music played 

"3 

= 

5 u 
£ 3 

s u 

ai 

es 

s 


e.g., 

rights/permissions/ 
credentials 
determine whether 
the file can be 
copied to 2d device 

if copy is allowed, 

a copy is made, 

and transferred to a 
memory of 2d 
device with a 
speaker and/or video 
output 

file is transferred 

and played 

Steflk 


Usage rights) (e.g. Transport-Code, 
Time-Spec determine whether the file 
can be copied, e.g. to rendering 
repository 203 in Fig. 2. Repository 
201 is coupled to a rendering device to 
comprise a "rendering system" 7:66- 
8:3,8:22 et seq.) 

if copy is allowed, 

a copy is made, 

and transferred to the memory of the 
rendering repository; the music file is 
stored in a repository, either 
ephemerally or permanently (or it 
could be stored in the music- 
equivalent of the "printer repository" 
of 8:39-46) 

file is transferred 

Played, in URG sense and in sense of 
being rendered (e.g. 20:41) 

INTERTRUST'S PLR 3- 
1 STATEMENT 


Windows Media Rights 
Manager enforces the license 
restrictions 

Windows Media Rights 
Manager determines whether 
the 

AllowTransferToNonSDMl 
or AllowTransferToSDMI 
rights are present 

Transfer to the SDMI or non- 
SDMI portable device, if 
allowed by Windows Media 
Rights Manaeer 

Portable device necessarily 
includes at least a memory 
and audio output. 

Music file is transferred to the 
portable device 

Portable device plays the 
music 

CLAIM 
LANGUAGE 
(InterTrust's 

version) 

said at least one 
copy control 
controlling the 
copies made of 
said digital file: 

(d) determining 
whether said 
digital file may be 
copied and stored 
on a second device 
based on at least 
said copy control; 

(e) if said copy 
control allows at 
least a portion of 
said digital file to 
be copied and 
stored on a second 
device, 

(1) copying at 
least a portion 
of said digital 
file: 

(2) transferring 
at least a portion 
of said digital 
file to a second 
device including 
a memory and 
an audio and/or 
video output; 

(3) storing said 
digital file in 
said memory of 
said second 
device: and 

(4) including 
playing said 


s 

1 


COS 


T3 .2 

a> > 


E u 

ii 


« a 

6* « 

« .H 

t >» 

t£ S 

c a 

o a 

£ 5 

■s s 

U | 


5 J5 

E U 


I* 

1 § 


6% P g 

3 » £ -2 


•a 

O (- _ 



3 o 

"81 

■5 «H 

£ - ■ 


tran; 
for 





tfo 


crv 

3un 


CO 

u 


ion 

nts 


nat 

me 

ob 

'5b 

£ 

r- 1 

Ori 

dec 

Pril 


IS 

8 i 


T3 . 


E <8 ** 
OT ^ 


il 


c « 

I* 


II! 

S I > 1 



siiJllilS'H 

311111111! 



^ c a> 


E M 
3 *U 


S 3 — o 

i II 1 
!f si 

o s -3 « 

g ■o w w 

SfSjjl 



E « 


8.2 
8 o 


i2 

£ £ £ 

to •53 w 


60 


■- w a> 

11 3 

E o >» 

S O N 

i-i-il a 

o *- c -5 *o 


i 

I! 


0 c 



c s § » -3 t s 

§ g £ .H I 2 u 

Mfll 


s .r 


4) 


to W 
> **- 

'5 "O 

sf 


I 


be 


1 


3 


o5 

55 

I 


I 

i 


r 


•A 3 
T3 .2 


ea ex 
« .5 

CI $ 

P -3 

3 5 
if 

09 .5 

o o 
r a 

«1 

il 

" flu 

•3 S 

*S 
5 5 

II 
.5 * 


ex « 

.5 w 

« .5 

M e 

C 09 

O Q. 

E E 

« © 

U I 


Neuman and/or 
Chaum 

See 1(b) 

storing any of 
numerous positive 
or negative 
credentials, rights, 
or restrictions 
associated with file 

copy made or not 
depending on a 
"control" 

2d device may be 
identified and 
transferability 
determined based on 
one or more of its 
features 

CUPID 

See 1(b) 

Origination Server 
creates Printjob, uses 
Workflow 

Management Service, 
records requirements, 
tasks and prerequisites 
needed in order to 
process 

Origination Server 
checks copy controls 
to determine whether 
to transfer Printjob to 
Printshop 

Origination Server 
initiates contact with 
Notification Server 
running at Printshop 
and requests the PSP 
(Printshop 

Specification Record) 
containing information 
regarding the 
capabilities of the 
Printshop 

Hellman 

See 1(b) 

usage rights or 
access controls 

copy made or not 
depending on a 
"control" 

2d device may be 
identified and 
transferability 
determined based on 
one or more of its 
features 

CNI/IMA 94 

storing file in memory 
of a device 

storing "control" 
information in 
memory 

control may be used to 
determine whether file 
can be copied to 2d 
device using the 
rendering software 

based at least in part 
on features of 2d 
device (e.g., does user 
have "write" 
privileges to 2d 
device; or is the user 
identification a match; 
or is the 2d device able 
to receive data, e.g. 
using a given protocol) 

Blaze 

Stores in memory 
managed by Unbc/CFS 

Information associated 
with the file is stored 
in memory (e.g., a 
CFS directory) by 
Unix/CFS and 
includes a first 
"control" (e.g., a 
particular permission 
or right or key) 

Based on the 
"control," determines 
whether file can be 
copied to 2 nd device 

2d device may be 
identified and 
transferability 
determined based on 
one or more of its 
features 

Choudhury, 
Maxemchuck et al. 

See 1(b) 

rights and levels 
stored in memory 

copy made or not 
depending on a 
"control" 

checking 2d device 

Stefik 

See 1(b) 

See 1(c) 

E.g., "Certain communications and 
transactions may be conditioned on a 
repository being in a particular 
security class." 

No copy is stored on 2d repository (or 
the rendering hardware) if the usage 
rights and/or security level 
information and/or access controls 
don't allow it 

Usage rights, security level check 
and/or access control check may fail 
based on 2d device's identity 

INTERTRUST'S PLR 3- 
1 STATEMENT 

Windows Media file is stored 
in consumer's computer and 
all use of it is securely 
managed by the Secure 
Content Manager in Windows 
Media Player. 

License information is stored 
in the License Store (WMRM 
SDK, Step 10), license 
information includes Rights. 
License Rights may include 
AllowTransferToNonSDMI, 
AllowTransferToSDMI, 
LicenseCount 

WMRM determines whether 
transfer rights arc included in 
license (WMRM SDK, Step 
5) 

Portable Device Service 
Provider Module identifies the 
portable device as either 
SDMI -compliant or non- 
SDMI-compliant and provides 
this information to Windows 
Media Device Manager, 
which allows the transfer 
based on whether the device 
identification matches the 
License Right. 

CLAIM 
LANGUAGE 
(InterTnist's 

version) 

(b) storing said 
digital file in a 
first secure 
memory of a first 
device; 

(c) storing 
information 
associated with 
said digital file in 
a secure database 
stored on said first 
device, said 
i n format ion 
including a first 
control: 

(d) determining 
whether said 
digital file may be 
copied and stored 
on a second device 

based on said first 
control. 

(l)said 
determining 
step including 
identifying said 
second device 
and determining 
whether said 

allows transfer 
of said copied 
file to said 
second device, 
said 

determination 
based at least in 
part on the 
features present 
at the device to 
which said 


3 


* 


>> S5 

T3 .2 

o> > 


01 -O 

a y 


a* 


.5 

« £ 

X 

DA «> 
B 

W> 
« B 

- & 
vi B 

B 09 

II 

!i 

a $ 


U K 


- o ^ 


It 

£ -° 

C 4> 

cu -x '3 
S3 8*5 £ 


■5 « 
is € 


o 3 


§■5 

.s u 





5-3 

V) T) 

lift 
till 


21 :* 
& * s 

sill 


3 „ 
s 8 f 


1 


- - .2 


S 8 f 

1|.S 

«S S "2 

" > 3 
.a £ 

> -3 


5 
& 


(2 Si 



II 


c3 > 


op J "2 .Hti o 

I i.i nil d 



§ 8 

.2 > 

S 8. 


3 .£ b_ 
?.H ill 

"■ass '? 
a --a a s -8 


1- 


li J 


S»f s 
Is I 


i 


Mi 

: &"s il 


li 

E - 

m O 


o <~ 

S.S 

g 8 
> & 



3 


s g 

w — 
o o 


2 -5 


3 


i 


I 

I 

I 


t: 


I 

C M 

(A 

is 

T3 .2 
« > 
DC n 

« © 

73 w> 

e u 
'5 .5 

« -3 

8 > 

a .5 

m <*- 

on o 


" cu 

*3 S3 

•o 5 

.5 «- 

j= *- 

DJ3 « 

« .5 

£ >> 

«5 c 

C C8 

e a, 

£ E 

« o 

r * 

U I 


Neuman anaVor 
Chaum 

"identifier" accessed 
according to 
InterTrust 

authentication 
succeeds or fails 

file is "processed" 
only if 

authentication 
succeeds 

See 11(c) I 

CUPID 

Order Name and 
authorization codes for 
documents 

Checks login, or 
authorization codes 
against valid system 
users via standard 
Unix login measures 
or through secure PKl 
authentication 
techniques 

If authorized as a valid 
document publisher, 
the Origination Server 
allows the files to be 
stored on the 
Origination Server, 
see 1(a) 

See 11(c) I 

Hellman 

or check e.g. 
password or ACL or 
key 

authentication 
succeeds or fails 

file is "processed" 
only if 

authentication 
succeeds 

rights include limits | 

CNI/IMA 94 

"identifier" accessed 
according to InterTrust 

authentication 
succeeds or fails 

file is 'processed" 
only if authentication 
succeeds 

attributes are stored | 

Blaze 

"identifier" accessed, 
e.g., login or password 
or signature or address 
or number 

authentication 
succeeds or fails 

"storing" occurs if 
authorized 

see 11(c) I 

Choudhury, 
Maxemchuck et al. 

"identifier" accessed 
according to 
InterTrust 

authentication 
succeeds or fails 

file is "processed" 
only if 

authentication 
succeeds 

license rights I 

Stefik 

"identifiers" can be accessed. 

"A repository will have associated 
with it a repository identifier. 
Typically, the repository identifier 
would be a unique number assigned to 
the repository at the time of 
manufacture. ... As a prerequisite to 
operation, a repository will require 
possession of an identification 
certificate. Identification certificates 
are encrypted to prevent forgery and 
are issued by a Master repository." 

- Works can be signed 

- Passwords can be associated with 
users or devices 

- Physical security comprises known 
authentication steps 

authentication succeeds or fails 

Digital work is stored in repository 
only if authentication succeeds 

associated usage right(s) or security | 

INTERTRUST'S PLR 3- 
1 STATEMENT 

user's Windows Media Player 

Music file cannot be used 
unless identifier indicated in 
License matches user's 
Windows Media Player 
identifier 

Music file wilt not be 
processed through Windows 
Media Player, including 
protected rendering buffers, 
unless the identifiers match 

License includes Rights and is 

CLAIM 
LANGUAGE 
(IntcrTrust's 

version) 

least one 
identifier 
associated with 
a first device or 
with a user of 
said first device; 
and 

(2) determining 
whether said 
identifier is 
associated with 
a device and/or 
user authorized 
to store said 

Hit, 

(c) storing said 
digital file in a 
first secure 
memory of said 
first device, but 
only if said device 
and/or user is so 
authorized, but not 
proceeding with 
said storing if said 
device and/or user 
is not authorized. 

(d) storing | 


t 

3 
1 


3 


5 


3 

e 


g E 


o 

s 

u -a 


o 


« © 
« £ 

S O 

« .2 

2£ 

» -a 
v a 

« .s 

a\ o 
T s 

Si 

S g 
r. a, 


tS C 

C at 

o a. 

E E 

« o 


u 

E 

0 S 


a; 

si£ 

H S 

CO W 

P H 
ft! < 


til m 

Pi 


5 


O w 

,5 « 

3 w O 

o 5 ^ 


3 3 



log* 

31-3 I s -3 

'■3 1 1 .8 I " 

S -O u K 5 ,o ■ 


E 

e 5 


IS u 


o .« 


£ > 

on J3 


5 a 


51 8 


Sf 


E T3 '3 

Illi 


iff 

8 « 

^ .S3 


1 §£• 


51 


• c3 O 


II 

IS m 


itted 

udes 

;rm 

inci 

if p< 

ice i 

.8 

~o 

cop 



« o c 5; 

>. > u & 
i -°. 


^1 

Iff J 
jllft 

H co H OS i 


ill 


« I 

c rt *- 

o to 2 


rt O 


•111 111! 
ills s || 


<L> C 


^5 

■a 


3 

1 

.5 


I 
« 

to 


5 8. 


w> « 2 c 

■gs i s 
^••6 a s • 


I 


-O 3 
T3 .2 

BO £ 

* © 
« .S 

« 73 

P - 

C u 

« .S 

si 

m v. 

Ov o 

r c 
3 « 

o « 

> <2 
.5 

o> <2 
-c 

•** « 

« .S 
h >» 
w S 
S tt 

o a 
E E 

a> © 

U l 


EU 


w - 

H 

Z 


6d « 
-O IS. 

3 » £ ° 


Sr. 


f 

sr.*. 

mt- 


v:- 


ts t * = 

«s I 

§ Si 

111 

- » I 5 

< O U 5 


« o a> S — 
rt o o a> c o 

4J O S Uh ^ w 


*5b'« 

'■a 8. 
< g 



o c ra 
« O M 

fsllf 


M's 

o e c 


l> 8 1 

O C 4J u, 
0(3*0 0 


1 alii 



2 * Vu t£ 


§1" 
£ 


o -r *J3 35 
'3 ^ Q 3 
« -O a 2 A 

mi* 

litis 

O eo S> y vo 
O ft) C 3 - 



a * -1 .8 

a> O c3 w 
»- 4» >* 
? TJ "(j ■£ 

M « : a 

Si 3^ 


60 5 *i 


fin -ms 

iiinir 



§ if 

1 3 e 

Willis 


o c rt 

■5 O M 


1 £ 


•s o M 


H a -a § * g 

liJUif 


i"8 




•ovid 
cludi 

edfo 
ecryi 
sage 



ii 

S .2 
« 1 

3 rm ation i 
cey use to 
;h may be 

epc 
rm 

house" r 
tion info 

* * 1 

"clearing 
authoriza 
key" 


Authoi 
access 
digital 
rights) 


™ ^ 


2^ 
a o 


1 g 8 i a o 1 


bo 1 
S 6 e 

5 3 



- 3 « 
a S.g 

> 5 t 
« 8 o 
Q Tj a 


"9 c s S § H ? 

III 

3-S ^ 


■5 v — -3 = » 


*2 • 

5.S 


i -a - - - - " 


6 .s s a 


1 


8 

! 


3 GOO 


■o .2 

&JD K 

.8 © 


S 5 

'3 .S 

si 

m 

o\ o 

Si 

r_ ex 
o 8 

la 


on « 

.5 w 

« .5 

c « 
o a 
£ S 


Neuman anaVor 
Chaum 


a first "control 
received 

File stored 

and used to 
determine whether 
file maybe copied 
and stored on 2d 
device 

if copy is allowed 

a copy maybe made 

1 transferred 1 

CUPID 

Origination Server, 
decrypted and 
uttimately included 
into final Printjob by 
Document Assembly 
Service 

Right to reproduce 
authorization is 
received by 
Origination Server 

File stored, E.g. 
Workflow 

Management Service 
communicates with 
Document Assembly 
Service that creates 
printable materials by 
assembling 
subdocuments 
referenced during 
publishing step 

Authorization is 
checked prior to 
including files in 
Printjob 

If Authorization is 
granted then the file 
can be copied 

CUPID Client copies 

I transfers 

Hellman 


a first "control" 
received 

File stored 

and used to 
determine whether 
file maybe copied 
and stored on 2d 
device 

if copy is allowed 

a copy may be made 

I transferred 

CNI/IMA 94 


a "control" comes with 
the file 

File stored 

"control" determines 
whether file can be 
copied to 2d device 

if the copying is 
allowed 

copy made 

| transferred 

•o 

N 

j» 

5 


Receives file 
permissions or key 

File stored 

Uses permissions or 
key to determine 
whether can copy to 
another device 

If permission key 
allows or signature 
works 

The file is copied 

| Transferred to a 2 nd 

Choudhury, 
Maxemchuck et al. 


one or more 
"controls" received 
from 

"clearinghouse" 

File stored 

"control" determines 
whether file can be 
copied to 2d device 

if the copying is 
allowed 

copy made 

| transferred 

Stefik 


one or more "controls" is received 
from "clearinghouse" repository 

Digital work stored in a l w device's 
memory 

"control" determines whether file can 
be copied to 2d device 

if the copying is allowed 

copying occurs 

I the work is transferred 

INTERTRUST'S PLR3- 
1 STATEMENT 


WMRM SDK, Steps 8-9. 

WMRM SDK, Step 3. 

At least the following 
WMRMRights Object 
properties meet this 
limitation: 

AllowTransferToNonSDMI, 
AllowTransferToSDMI 
Trans ferCount 

This and all subsequent claim 
steps occur when the 
condition specified in the 
WMRMRights Object 
property is met 

Transfer to the SDMI or non- 
SDMI portable device, if 
allowed by Windows Media 
Riehts Manager 

| Portable device necessarily 

CLAIM 
LANGUAGE 
(InterTnist's 

version) 

of said first digital 
file: and 

(e) receiving a first 
control from said 
clearinghouse at 
said first device; 

(0 storing said 
first digital file in 
a memory of said 
first device; 

(g) using said first 
control to 
determine whether 
said first digital 
file may be copied 
and stored on a 

second device: 

(h) if said first 
control allows at 
least a portion of 
said first digital 
file to be copied 
and stored on a 
second device: ! 

(i) copying at least 
a portion of said 
first digital file; 

<S 

00 

a 

| 

1 

3 



MAY 0 7 200Z 

IN THE UNITED STATES DISTRICT COlflM&RD W. WlEKING 

CLEft5.U.S.ni?fRiCT COURT 

FOR THE NORTHERN DISTRICT OF CAimm$3to* Cm]k 



INTERTRU3T TECHNOLOGIES No, C 01-1640 SBA 

CORPORATION, a Delaware corporation, 

Consolidated with C 02-0647 SBA 

Plaintiff, ^ 

ORDER GRANTING DEFENDANT 

v MICROSOFT CORPORATION'S 

RENEWED MOTION FOR PARTIAL 

MICROSOFT CORPORATION, ^J^^lfJ^^^vro 
a Washington corporation, ° F THE 

GRISWOLD PATENT 

[Docket NpisMO]?; & ^ ^ 


Defendant. 


AND COUNTER ACTION. , . £}M pcfibS HI lliis flCtoflS- 

/ 


21 1 


In vi.w of plaintiff s statement of non-opposition to defendant's Renewed Motion for Partial 
Summary Judgment of Noninfringement of the Criswold Patent, 

IT IS HEREBY ORDERED THAT defendant's Renewed Motion for Partial Summary 
Judgment of Noninfringement of the Griswold Patent is GRANTED. 

IT IS FURTHER ORDERED THAT the Case Management Conference scheduled for May 
7, 2002 is CONTINUED to M av 23 - 2002 flt 3:00 p - m ' Plaintiffs counsel is to set up the 
telephonic conference call with all the parties on the line and call chambers at (5 10) 637-3559 at the 
time designated above. NO PARTY SHALL CONTACT CHAMBERS DIRECTLY WITHOUT 
PRIOR AUTHORIZATION OF THE COURT. Since the parties filed a Joint Case Management 
Statement on April 26, 2002, the parties need not file a new Statement unless changed circumstances 
warrant the illing of an updated statement Any updated statement shall be filed at least five (5) 
days in advance of the new CMC date. 

IT IS SO ORDERED. 


Dated- May 3 2002 SAUNDRA BROWN ARMSTRONG^ 

Dated. May i, ^ Judgc 


PATENT 
Customer Number 22,852 
Attorney Docket No. 0745 1 .0001 . 1 0 
InterTrust Ref. No. : IT-5.0.2 

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE 

In re Application of: 

Karl L. GINTER et al. 

Serial No.: 09/328,668 

Filed: June 9, 1999 

For: SYSTEMS AND METHODS FOR 
SECURE TRANSACTION 
MANAGEMENT AND 
ELECTRONIC RIGHTS 
PROTECTION 

Assistant Commissioner for Patents 
Washington, DC 20231 

Sir: 

NOTICE REGARDING RELATED LITIGATION 

Applicants hereby notify the U.S. Patent and Trademark Office that several patents 
assigned to InterTrust Technologies Corporation ("InterTrust") are involved in litigation. The 
present application, Serial No. 09/328,668, is a continuation of U.S. Patent No. 5,982,891, which 
is one of the patents at issue in the litigation, and shares a common parent with U.S. Patent Nos. 
6,389,402 Bl; 6,253,193 Bl; 6,185,683 Bl; 5,949,876; 5,917,912; 5,915,019; and 5,892,900, 
which are also at issue in the litigation. 

STATUS OF RELATED LITIGATION 

The status of the litigation is as follows. On April 26, 2001, InterTrust filed a Complaint 
alleging that Microsoft Corporation ("Microsoft") was infringing U.S. Patent No. 6,185,683 Bl, 


Group Art Unit: 2132 
Examiner: G. Barron, Jr. 


1 

2 
3 
4 
5 
6 
7 
8 
9 

io 
n 

12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


DECLARATION OF SERVICE VIA ELECTRONIC MAIL AND U.S. MAIL 

I am more than eighteen years old and not a party to this action. My place of 

employment and business address is 1000 Marsh Road, Menlo Park, California 94025. 

On May 14, 2002, 1 served: 

ORDER GRANTING DEFENDANT MICROSOFT CORPORATION'S RENEWED 
MOTION FOR PARTIAL SUMMARY JUDGMENT OF NONINFRINGEMENT OF THE 
GRISWOLD PATENT 

By transmitting a copy of the above-listed document(s) in PDF form via electronic mail Michael 
H. Page at mhp@kvn.com, Christopher P. Isaac at chris.isaac@finnegan.com, Stephen E. 
Taylor at staylor@tcolaw.com and James E. Geringer atjames.geringer@klarquist.com and 

also by placing true and correct copies of the above documents in an envelope addressed to: 


John W. Keker, Esq. 
Michael H. Page, Esq. 
KEKER & VAN NEST, LLP 
710 Sansome Street 
San Francisco, California 941 1 1 
Tel. No. 415-391-5400 
Fax No. 415-397-7188 
Email: jwk@kvn.com 
Email: mhp@kvn.com 

Attorneys for Plaintiff INTERTRUST 
TECHNOLOGIES CORPORATION 

Stephen E. Taylor, Esq. 

TAYLOR & CO. LAW OFFICES 

1050 Marina Village Parkway, Suite 101 

Alameda, CA 94501 

Tel. No. 510-865-9401 

Fax No. 510-865-9408 

Email: staylor@tcolaw.com 

Attorneys for Plaintiff 
INTERTRUST TECHNOLOGIES 
CORPORATION 


Christopher P. Isaac, Esq. 

FINNEGAN, HENDERSON, FARABOW, 

GARRETT & DUNNER LLP 

13001. Street, N.W. 

Washington, DC 20005-3314 

Tel. No. 202-408-4000 

Fax No. 202-408-4400 

Email: chris.isaac@finnegan.com 

Attorneys for Plaintiff 
INTERTRUST TECHNOLOGIES 
CORPORATION 

John D. Vandenberg, Esq. 

James E. Geringer, Esq. 

KLARQUIST, SPARKMAN, LLP 

One World Trade Center 

121 S. W. Salmon Street, Suite 1600 

Portland, Oregon 97204 

Tel. No: 503-226-7391 

Fax No: 503-228-9446 

Email: john.vandenberg@klarquist.com 

Email: j ames.geringer@klarquist.com 

Attorneys for Defendant and Counterclaimant, 
MICROSOFT CORPORATION 


and sealing the envelope, affixing adequate first-class postage and depositing it in the U.S. mail 
at Menlo Park, California. 

Executed on May 14, 2002 at Menlo Park, California. 

I declare under penalty of perjury that the foregoing is true and correct. 


ANNA FREDDIE 

nnr<:<;vi i RQ70Q 1 DECLARATION OF SERVICE VIA ELECTRONIC MAIL 

DULbbV l l vujj. i AND v s MAIL _ CASE NO c OM640 SBA (MEJ) ); 

CONSOLIDATED WITH C 02-0647 SBA